Chapter 8 Flashcards
What protocol suite below is the most commonly used protocol for local area network (LAN) communications
TCP/IP
At what level of the OSI model does the IP protocol function?
Network
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?
Transport
The capability for devices to exchange low-level control messages is provided by what protocol below?
ICMP
When using SNMPv1 or SNMPv2, which piece of information is needed to view information from an agent?
community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree
DNS
DNS poisoning can be prevented using the latest edition of what software below?
BIND
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?
21
What device operates at the Network Layer (Layer 3) of the OSI model and forwards packets across computer networks?
Router
The development of this technology below can be used as a defense against DoS and DDoS SYN flood attacks.
Flood guard
Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to prevent loops?
802.1d
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
VLAN
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?
IEEE 802.1x
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?
Cloud Software as a Service
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
Hypervisor
In what type of cloud computing does the customer have the highest level of control?
Cloud Infrastructure as a Service
What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?
Sticky
Which of the following is not a benefit that can be provided by using IP telephony?
Decreased network utilization
What is the term used for a device that requests permission from an authenticatior to join a network?
Supplicant
What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?
NetBIOS