Domain 2 Flashcards
(35 cards)
Which of the following topologies is most widely used today because of its scalability and fault tolerance?
a) Ring Topology
b) Loop Topology
c) Star topology
d) Bus Topology
Star topology
When examining an IP packet header, at which byte would find the Protocol field?
a) Byte 11.
b) Byte 9
c) Byte 8
d) Byte 10
Byte 9
Which of the following statements is FALSE?
a) 802.11b supports up to 2.4 Mbps at 11 GHz
b) 802.11a supports up to 54 Mbps at 5 GHz
c) 802.11g supports up to 54 Mbps at 2.4 GHz
d) 802.11b supports up to 11 Mbps at 2.4 GHz
802.11b supports up to 2.4 Mbps at 11 GHz
Which of the following is NOT a WAN communication technology?
a) Token Ring
b) Frame relay
c) Voice over IP
d) Dedicated lines
Token Ring
If I were implementing a 16 Mbps network to the exact specifications provided to me, which cable category would be most appropriate to use?
a) Category 4
b) Category 5
c) Category 3
d) Category 2
Category 4
Which network component should be used when you are concerned with internal network sniffing?
a) A network hub
b) A network bridge
c) A network hop
d) A network switch
A network switch
Which of the following is the correct binary representation of the decimal number 252?
a) 11111110
b) 11111100
c) 11101110
d) 01111111
11111100
Which of the following network layer protocols provides authentication and confidentiality services by encapsulating standard IP communication, independent of the application generating the traffic?
a) SET
b) PEM
c) IPSec
d) S/MIME
IPSec
Which of the following is the fundamental protocol of the internet?
a) TCP
b) UDP
c) HTTP
d) IP
IP
Which of the following binary, decimal, protocol combinations is correct?
a) 00000000, 0, ICMP
b) 00100001, 17, UDP
c) 00000011,6, TCP
d) 00000110, 6, TCP
e) 11110001, 1, ICMP
00000110, 6, TCP
Which of the following allows you to uniquely identify a complete connection among all other connections on the internet?
a) A socket
b) A source and destination IP address
c) A source and destination port number
d) A hostname
A socket
When you encounter two NICs with the same embedded MAC address, what should you do?
a) Select a different MAC address from those available.
b) Increment one of the duplicate MAC addresses by 2.
c) You will not encounter this situation, MAC addresses are unique.
d) Reset both NICs in order to resolve the MAC address conflict.
You will not encounter this situation, MAC addresses are unique
Which of the following layers of the Open Systems Interconnect (OSI) model interacts with your information and prepares it to be transmitted across the network?
a) Network Layer
b) Transport Layer
c) Presentation Layer
d) Application Layer
Transport Layer
What is the current, widespread implemented solution to network address congestion and conservation?
a) IPv4
b) CIDR
c) IPv5
d) IPv7
CIDR
Which of the following is a helpful network path troubleshooting tool that shows each of the nodes from a local machine to a destination?
a) Ping
b) TCP
c) Tripwire
d) Traceroute
Traceroute
Which of the following is NOT a security implication of using VPNs?
a) VPN communications bypass firewalls, IDS, virus scanners and web filters because of encryption.
b) VPN communications require a certain level of trust that home client computers are adequately protected.
c) VPN communications are slower because data must be encrypted and decrypted and the endpoints.
VPN communications are slower because data must be encrypted and decrypted and the endpoints
During which team’s creation would one develop escalation, resolution, post-incident follow-up and reporting procedures?
a) Pattern Matching Team (PMPT)
b) Profile Team (PT)
c) Protocol Behavior Team (PBT)
d) Computer Incident Response Team (CIRT)
Computer Incident Response Team (CIRT)
What is it called when data is encrypted into ciphertext, transmitted over the Internet and then decrypted at the destination into the original cleartext?
a) Transmission Control Protocol (TCP)
b) File Transfer Protocol (FTP)
c) Data obfuscation
d) Virtual Private Network (VPN)
Virtual Private Network (VPN)
Which of the following is NOT one of the primary principles associated with securing enterprise and telecommuting remote connectivity?
a) Securing external connections
b) Remote access authentication systems
c) Ensuring high connection speeds
d) Remote node authentication protocols
Ensuring high connection speeds
Which of the following is an example of the Telecommunications and Network Security domain that directly affects the Information Security tenet of availability?
a) VPN
b) IPSEC
c) OOP
d) RAID
RAID
Which RAID Level stripes data across all disks but provides NO redundancy?
a) RAID Level 0
b) RAID Level 1
c) RAID Level 2
d) RAID Level 5
RAID Level 0
Which RAID Level mirrors each drive to an equal drive partner, which is continually being updated with current data?
a) RAID Level 3
b) RAID Level 5
c) RAID Level 1
d) RAID Level 7
RAID Level 1
Which RAID Level consists of bit-interleaved data on multiple disks?
a) RAID Level 2
b) RAID Level 1
c) RAID Level 5
d) RAID Level 7
RAID Level 2
Which RAID Level writes parity info to the next available drive rather than a dedicated drive using an interleave parity?
a) RAID Level 0
b) RAID Level 5
c) RAID Level 3
d) RAID Level 2
RAID Level 5