Chapter 8 Flashcards

1
Q

What protocol suite below is the most commonly used protocol for local area network (LAN) communications

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At what level of the OSI model does the IP protocol function?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The capability for devices to exchange low-level control messages is provided by what protocol below?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When using SNMPv1 or SNMPv2, which piece of information is needed to view information from an agent?

A

community string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS poisoning can be prevented using the latest edition of what software below?

A

BIND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What device operates at the Network Layer (Layer 3) of the OSI model and forwards packets across computer networks?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The development of this technology below can be used as a defense against DoS and DDoS SYN flood attacks.

A

Flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to prevent loops?

A

802.1d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?

A

Cloud Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In what type of cloud computing does the customer have the highest level of control?

A

Cloud Infrastructure as a Service

17
Q

What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?

18
Q

Which of the following is not a benefit that can be provided by using IP telephony?

A

Decreased network utilization

19
Q

What is the term used for a device that requests permission from an authenticatior to join a network?

A

Supplicant

20
Q

What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?