The application layer is responsible for the addressing and routing of packets. True or False?
False
TCP/IP is a routable protocol that provides the ability to transfer network packets from one segment to another. True or False?
True
___ is a nonproprietary industry-standard protocol suite.
TCP/IP
In what layers are the core protocols of TCP/IP found?
Internet and Transport
How many layers does the OSI reference model have?
7
Which of the following TCP/IP Layers offers the same services using the protocols TCP and UDP that are specified in the Transport layer of the OSI/RM
Transport
You need to ensure that users can send emails to and from your organization. Which of the following ports will need to be opened in the firewall?
25
What is the host ID for the address 172.19.4.72 with a subnet mask of 255.255.224.0?
4.72
Which of the following core protocols in TCP/IP is responsible for the addressing and routing of data?
IP
Which of the following application layer protocols is used for its efficiency with file transfers?
FTP
What is the CIDR notation for the subnet mask 255.248.0.0?
/13
The subnet mask of 255.255.224.0 stops in the third octet only covering the first 3 bits out of 8. Since your IP address is 4 in that octet, that wouldn?t be one of the bits that was shielded by the mask (128,64, or 32) and thus part of the host ID.
255.255.224.0
You need to configure a rule on the network firewall; what port should you define in the rule to allow RDP traffic to network servers?
3389
What is the network ID for the address 192.168.10.220/24?
192.168.10.0
Which of the following protocols in TCP/IP is used as the troubleshooting protocol to send informational messages back to source computers?
ICMP
Which of the following IPv6 addresses is not valid?
FC00::C110:DE32:FF::15
If you do not have a DHCP server on the same subnet as a client and you are using an older router, what will you have to install?
DHCP relay agent
Which of the following is not part of the DHCP lease process?
Broadcast
A DHCP server implies an actual server running the OS. True or False?
False
Which of the following records in a DNS zone is the most common and is required by all clients and servers?
Host (A) resource records
You need to create the appropriate DNS entry for you SMTP email server. Which type of resource should you create?
MX (Mail Exchanger) records
You have a host computer that has automatically generated an address and you would like to force the client to attempt to contact a DHCP server. How do you do that?
Ipconfig/renew
Which of the following represents the correct order of name resolution used by a client computer?
Local hostname, hosts file, cache, DNS
You have recently experienced name resolution problems which have now been fixed. A computer on the network is still experiencing issues and cannot resolve names it had previously attempted to resolve when your network was experiencing the problem. What should you do?
IPCONFIG/flushdns
Which of the following ensures that IP addresses, which are assigned to computers security throughout the network, are not also given out by the DHCP sever?
Exclusion range
You have a network that contains many portable systems as well as desktops. You have a limited number of IP addresses in the DHCP server scope and need to ensure that you don?t run out of addresses. Which of the following should you configure on the scope?
Lease duration
What is the first communication between a client and server in the DHCP Lease Generation process?
DHCP Discover
What is required by any client that is going to connect with and communicate over the network?
Network interface card
Layer one devices provide network segmentation. True or False?
False
Layer one network devices are physical devices.
True
Ethernet uses what kind of signal?
Baseband
Which network protocol is used to make sure that our topology on switched Ethernet networks remains loop free?
STP
A heterogeneous bridge packages frames of one format into the format of another.
False
You are trying to identify the common characteristic of network switches which is primarily used for monitoring traffic to and from the switch? Which of the following best fits that description?
Port mirroring
Which of the following routing protocols is a distance vector protocol that bases routing decisions on a routing table and information obtained from neighboring routers?
RIPv2
Hubs generally provide connectivity in older Ethernet networks and could have which of the following connector types available? (Two answers)
Coaxial, RJ-45
Which of the following routing protocols is an Exterior Gateway Routing Protocol that stands alone in comparison to others?
BGP
Routers for large internetworks may require routes to be added to inform them all of networks paths inside the organization. Which of the following will assist in this configuration?
RIPv2
Which of the following networking devices provides significant advantages over standard Ethernet hubs because of the isolation of collision domains?
Switch
Which of the following IEEE standards represents the concept of VLAN trunking to host multiple logical networks on a single physical segment?
802.1q
Which of the following technologies will allow multiple logical networks to share the same physical network segment while keeping traffic separated?
VTP
Which of the following is also known as a multiport repeater?
Hub
___ is an open committee of groups that work together.
IETF
Which of the following is not a standard organization?
CPU
The data link layer is responsible primarily for constructing this frame. True or False?
True
An RJ-11 connector is capable of having up to how many pins?
6
Which of the following should be used to physically attach an RJ-45 connector to a CAT5 cable?
Crimping tool
Which of the following cable standards has the highest effective range at a greater expense?
1000Base-LX
Which of the following is resistant to EMI and crosstalk?
100Base-FX
The IEEE defines standards for computer networking. Which of the following represents the standard for Ethernet?
802.3
Which of the following cable types are the most widely used in a corporate gigabit network?
CAT5e
Which of the following is the length of a MAC address?
48 bit
Which of the following fiber connectors has a ferrule connector that is used to connect the fibers using a push/pull motion?
SC
A network cabling method which uses unshielded copper wire to deploy computer networks is a good description for which of the following cable types?
UTP
___ is required in this type of connection to convert digital computer signals into analog signals.
A modem
A WAN is a grouping of sites belonging to a single organization. True or False?
True
The capability of remotely connecting to networks for resource sharing and service access is called:
Remote Access
In order to connect an organization to the public carrier for either frame relay or T1 connections, which of the following components is used?
CSU/DSU
You are concerned about the level of security for passwords that are passed between remote clients and your VPN server running Windows Server 2012 R2. All remote clients are running Windows 7 or later Microsoft operating systems. You want to ensure the highest level of security is used for the passwords in transit over the network. Which of the following authentication protocols should you choose?
EAP-MD5
Which of the following T-connections will use leased lines and circuit-switched connections to provide 44.7 Mbps?
T3
You are the network administrator for your company. Several users work remotely, so you have configured their accounts to use a VPN connection using SSTP. To enhance the security of the network, the VPN server will be placed in the perimeter network. The firewall administrator would like to know which port to leave open on the external firewall to accommodate this. What port number should he ensure is open?
443
Which of the following WAN transmission methods provides a type of cell-switching network using fixed length cells and provides very high-speed WAN bandwidth?
ATM
Which of the following VPN protocols provides the most compatibility for third party operating systems and remote access clients?
PPTP
You are a network administrator for your company. You have been asked to implement password-based authentication that is supported on Windows and non-Windows clients for your remote access solution. Which of the following password-based authentication protocols should you choose?
CHAP
Which of the following connectivity methods is often used for small business and homes in order to connect to a public carrier, but could also be used as a backup connection for larger companies providing a dedicated and guaranteed amount of bandwidth?
DSL
You are the network administrator for your company and are managing remote access clients. Clients are using smart cards for authentication on the Internal network and you would like to extend that protection to remote access clients. Which authentication protocol is required in order to implement smart card authentication for VPN clients?
EAP-TLS
You are evaluating VPN protocols for remote access to your Windows Server 2008 network infrastructure. Which of the following VPN protocols provides the easiest administration of firewalls?
SSTP
Which of the following protocols is an industry standard providing centralization of AAA for all remote access clients and wired hosts?
RADIUS
The term used for the study of various network activities is:
Traffic analysis
Freeware utilities are less capable than other, more expensive utilities.
False
Which of the four primary monitoring tools in Windows breaks down the four major subsystems?
Resource Monitor
Which of the following types of upgrades applies to a particular device on a personal computer and usually provides additional features and performance enhancements?
Device driver update
You are attempting to monitor security on a particular system and would like to ensure that only the required services are running. Which of the following tools will be the most useful?
Port Scanner
You need to determine which system on your network is consuming the most bandwidth. Which of the following types of tools/reports will be the most useful?
Traffic monitoring
Which of the following utilities provides notifications when system and application errors occur?
Event Viewer
Which of the following terms is used to identify the various options that can be configured and monitored on a system using SNMP?
MIB
You are using the tool Microsoft Message Analyzer to monitor your system. Which of the following type of tool is this?
Packet analyzer
Which of the following can be used to view errors and warnings from multiple logs in a single results pane?
Custom view
Which of the following elements of a monitoring strategy is used to provide a report of normal operational values that can be used in troubleshooting and interpreting real-time data?
Baseline
Which of the following components is used in Windows Server to provide a single component containing performance counters and system configuration events?
Data Collector Sets
Which of the following is an application later protocol in TCP/IP that provides centralized management of a wide variety of network devices and systems?
SNMP
Wireless devices communicate with one another through what?
WAP
___ technologies are often used for remote controls.
Infrared
Ad hoc networks require access points to provide connectivity directly between two nodes.
False
Which of the following would be utilized in an enterprise network to provide centralized authentication for wireless clients and single sign on?
802.1x
Which of the following wireless network protocols is the newest standard providing 200+ Mbps transfer rates over radio frequencies operating on the 2.4GHz band or the 5.0 GHz band?
802.11n
Which of the following is the standard name for Bluetooth wireless connections?
802.15
Which of the following WLAN modes would not require access points but instead would focus on connecting individual devices?
Ad hoc
Which of the following wireless technologies provides slow transfer over short distances and is primarily used for mobile device connectivity?
Bluetooth
Which of the following security protocols should not be used due to the fact that it is susceptible to IV attacks?
WEP
Which of the following devices is used in infrastructure WLANs to connect wireless clients to the wired network devices and connections?
WAP
Which of the following wireless protocols suffers from fewer interference problems and can be used when required to provide up to 54Mbps transfer rates?
802.11a
A vulnerability is any event or action that might cause a breach or violation in security policies.
False
Cryptography is nearly as old as language itself
True
___ is the inability of a person or organization to disown its own data.
Non-repudiaton
Which of the following is not part of the CIA traid?
Authentication
What is the first ?AjQuery110106040322087184438_1510537247243
Authentication
Which of the following DMZ configurations provides the highest level of security while still allowing Internet access for LAN computers without the use of protocol switching?
Back-to-back
Which of the following attacks targets the availability of a particular technology in an effort to remove a device or application from service?
DoS
Which of the following policies is used to ensure that system configuration changes are proposed, approved, and documented in a consistent way?
Change management
A firewall capable of examining data streams and performing more advanced security checks is referred to as which of the following devices?
SPI
Which of the following malware types is typically hiding inside another program and will often cause identity theft and/or unauthorized remote access to the infected computer?
Trojan
Which of the following would be considered an attack on the human element of network security?
Phishing
Which of the following is the primary device that is used to secure the internal network from the Internet?
Firewall
Which of the following network attacks consists of an attacker capturing network packets for a data stream between two other computers?
Man-in-the-middle
Which of the following security policies is used to provide information for end users in regards to the way in which computer equipment is to be used?
Acceptable use
Which of the following protocols are included in IPSec?
Demultiplexing is a method by which multiple analog signals or digital streams are combined into one signal over a shared medium. True or False?
False
Which type of communication is one-to-everyone?
Broadcast
In a ___ environment, each individual node manages its own security.
Peer-to-peer
The topology of the network relates to its actual layout either logically or physically. True or False?
True
Which numbering system only uses zeros and ones?
Binary
Which of the following policies is used to determine who can make VPN connections to the system and might have physical policies as well as electronic equivalents?
Remote access policy
Which of the following should you consult when dealing with harmful materials that might be toxic?
MSDS
Which of the following primarily uses wireless technologies and includes mobile devices, smart phones, and personal computers?
PAN
Which of the following is an acronym describing control systems for industrial networks?
ICS
Which of the following layers in the OSI/RM provides protocols like HTTP, DNS, DHCP, etc?
Application
Which of the following is the first step in dealing with a Class C fire?
Remove the power source
Which of the following components of change management represents a change request that is raised by end users, management, or administrative personnel?
RFC
Which of the following OSI/RM layers primarily looks at MAC addresses to determine the forwarding of packets?
Data Link
Multimeters are capable of reading voltage, current, and resistance.
True
What is the final step of troubleshooting methodology?
Implement a solution
There is only one troubleshooting model.
False
Which of the following tools would be used to attach RJ-45 connectors to Ethernet cables using the EIA/TIAB wiring standard?
Crimper
Which of the following tools is used to eliminate any cached DNS entries on a client that is having trouble connecting to Internet websites?
Ipconfig /flushdns
Which of the following utilities can you use to determine the number of active network connections that are in place for a host system?
Netstat
Which of the following tools can verify connectivity and the route a packet takes to the remote network but is often blocked by perimeter firewalls or routers?
TraceRT
Which command-line tool is used to verify the IP Configuration on Unix and Linux systems?
Ifconfig
A customer is having a problem with network connectivity to the Internet and you are troubleshooting over the phone. Which of the following is the first action that you should take?
Identify the affected area
Which parameter will show the DNS client resolver cache when used with IPconfig?
DISPLAYDNS
Which of the following is a problem unique to troubleshooting WLANs?
Signal strength
Which of the following terms describes interference between neighboring signals on Ethernet wiring that occurs closest to the source system?
NEXT
Which of the following tools could be used to determine if there are physical problems with copper Ethernet cabling?
TDR
Server rooms should be secured using locks and a form of access control. True or False?
True
What can become a single point of failure if we are not careful?
Power
What is critical for keeping servers at an acceptable temperature?
Airflow
What is the component that is used to connect workstation drop cables to network switches?
Patch panel
What might be used in a server room to ensure that you can provide defense against flooding?
Drop floors
Which device provides battery backup capabilities for servers in most LAN infrastructures?
UPS
What is incredibly important in larger scenarios to ensure that you can locate the correct cables and ports in the wiring closet?
Labeling
What term is used to describe the cables that are used to connect workstations to the patch panel?
Drop cables
Which of the following components is used to extend workstation drops throughout a building?
IDF
What is often used in data centers in order to ensure the appropriate environmental climate for efficiently running servers?
HVAC units
Which of the following components represents the point at which the company equipment interfaces with the provider?s equipment?
Demarcation point
Virtualization has a large effect on user experience.
False
Which of the three main types of storage uses storage on a physical server?
Direct attached storage
Which is a type I hypervisor platform?
VMWare ESX Server
A single physical host server operates as a host for multiple virtual machines. True or False?
True
Which of the following virtualization platforms is a Type I Hypervisor?
Hyper V
Which of the following file types is not a type of virtual hard drive?
ISO
Which Windows operating system has the ability to function as an iSC SI target creating a complete Microsoft-based storage solution?
Windows Server 2012
Which protocol is used unified communications to actually transport voice data over Ethernet?
RTP
Which of the following options available with virtual machines is a backup, providing the ability to restore a virtual machine to a previous point in time?
Checkpoints
Which of the following Microsoft offerings represents a software as a service model?
Office 365
Which protocol is used by unified communications to establish a session between the caller and recipient?
SIP
Which of the following is required for unified communications if you are using an older PBX style phone system?
Gateway
Which cloud services model allows you to create virtual machines and virtual networks in the public cloud?
IaaS
What do you need to enable on the host system in order to be able to use some advanced virtualization features?
CPU Virtualization in the BIOS
Author
hunter82
ID
335939
Card Set
Flashcards_Information_Systems_Research
Description
Flashcards for the Final in Information System Research