The flashcards below were created by user hunter82 on FreezingBlue Flashcards.

  1. The application layer is responsible for the addressing and routing of packets. True or False?
  2. TCP/IP is a routable protocol that provides the ability to transfer network packets from one segment to another. True or False?
  3. ___ is a nonproprietary industry-standard protocol suite.
  4. In what layers are the core protocols of TCP/IP found?
    Internet and Transport
  5. How many layers does the OSI reference model have?
  6. Which of the following TCP/IP Layers offers the same services using the protocols TCP and UDP that are specified in the Transport layer of the OSI/RM
  7. You need to ensure that users can send emails to and from your organization. Which of the following ports will need to be opened in the firewall?
  8. What is the host ID for the address with a subnet mask of
  9. Which of the following core protocols in TCP/IP is responsible for the addressing and routing of data?
  10. Which of the following application layer protocols is used for its efficiency with file transfers?
  11. What is the CIDR notation for the subnet mask
  12. The subnet mask of stops in the third octet only covering the first 3 bits out of 8. Since your IP address is 4 in that octet, that wouldn?t be one of the bits that was shielded by the mask (128,64, or 32) and thus part of the host ID.
  13. You need to configure a rule on the network firewall; what port should you define in the rule to allow RDP traffic to network servers?
  14. What is the network ID for the address
  15. Which of the following protocols in TCP/IP is used as the troubleshooting protocol to send informational messages back to source computers?
  16. Which of the following IPv6 addresses is not valid?
  17. If you do not have a DHCP server on the same subnet as a client and you are using an older router, what will you have to install?
    DHCP relay agent
  18. Which of the following is not part of the DHCP lease process?
  19. A DHCP server implies an actual server running the OS. True or False?
  20. Which of the following records in a DNS zone is the most common and is required by all clients and servers?
    Host (A) resource records
  21. You need to create the appropriate DNS entry for you SMTP email server. Which type of resource should you create?
    MX (Mail Exchanger) records
  22. You have a host computer that has automatically generated an address and you would like to force the client to attempt to contact a DHCP server. How do you do that?
  23. Which of the following represents the correct order of name resolution used by a client computer?
    Local hostname, hosts file, cache, DNS
  24. You have recently experienced name resolution problems which have now been fixed. A computer on the network is still experiencing issues and cannot resolve names it had previously attempted to resolve when your network was experiencing the problem. What should you do?
  25. Which of the following ensures that IP addresses, which are assigned to computers security throughout the network, are not also given out by the DHCP sever?
    Exclusion range
  26. You have a network that contains many portable systems as well as desktops. You have a limited number of IP addresses in the DHCP server scope and need to ensure that you don?t run out of addresses. Which of the following should you configure on the scope?
    Lease duration
  27. What is the first communication between a client and server in the DHCP Lease Generation process?
    DHCP Discover
  28. What is required by any client that is going to connect with and communicate over the network?
    Network interface card
  29. Layer one devices provide network segmentation. True or False?
  30. Layer one network devices are physical devices.
  31. Ethernet uses what kind of signal?
  32. Which network protocol is used to make sure that our topology on switched Ethernet networks remains loop free?
  33. A heterogeneous bridge packages frames of one format into the format of another.
  34. You are trying to identify the common characteristic of network switches which is primarily used for monitoring traffic to and from the switch? Which of the following best fits that description?
    Port mirroring
  35. Which of the following routing protocols is a distance vector protocol that bases routing decisions on a routing table and information obtained from neighboring routers?
  36. Hubs generally provide connectivity in older Ethernet networks and could have which of the following connector types available? (Two answers)
    Coaxial, RJ-45
  37. Which of the following routing protocols is an Exterior Gateway Routing Protocol that stands alone in comparison to others?
  38. Routers for large internetworks may require routes to be added to inform them all of networks paths inside the organization. Which of the following will assist in this configuration?
  39. Which of the following networking devices provides significant advantages over standard Ethernet hubs because of the isolation of collision domains?
  40. Which of the following IEEE standards represents the concept of VLAN trunking to host multiple logical networks on a single physical segment?
  41. Which of the following technologies will allow multiple logical networks to share the same physical network segment while keeping traffic separated?
  42. Which of the following is also known as a multiport repeater?
  43. ___ is an open committee of groups that work together.
  44. Which of the following is not a standard organization?
  45. The data link layer is responsible primarily for constructing this frame. True or False?
  46. An RJ-11 connector is capable of having up to how many pins?
  47. Which of the following should be used to physically attach an RJ-45 connector to a CAT5 cable?
    Crimping tool
  48. Which of the following cable standards has the highest effective range at a greater expense?
  49. Which of the following is resistant to EMI and crosstalk?
  50. The IEEE defines standards for computer networking. Which of the following represents the standard for Ethernet?
  51. Which of the following cable types are the most widely used in a corporate gigabit network?
  52. Which of the following is the length of a MAC address?
    48 bit
  53. Which of the following fiber connectors has a ferrule connector that is used to connect the fibers using a push/pull motion?
  54. A network cabling method which uses unshielded copper wire to deploy computer networks is a good description for which of the following cable types?
  55. ___ is required in this type of connection to convert digital computer signals into analog signals.
    A modem
  56. A WAN is a grouping of sites belonging to a single organization. True or False?
  57. The capability of remotely connecting to networks for resource sharing and service access is called:
    Remote Access
  58. In order to connect an organization to the public carrier for either frame relay or T1 connections, which of the following components is used?
  59. You are concerned about the level of security for passwords that are passed between remote clients and your VPN server running Windows Server 2012 R2. All remote clients are running Windows 7 or later Microsoft operating systems. You want to ensure the highest level of security is used for the passwords in transit over the network. Which of the following authentication protocols should you choose?
  60. Which of the following T-connections will use leased lines and circuit-switched connections to provide 44.7 Mbps?
  61. You are the network administrator for your company. Several users work remotely, so you have configured their accounts to use a VPN connection using SSTP. To enhance the security of the network, the VPN server will be placed in the perimeter network. The firewall administrator would like to know which port to leave open on the external firewall to accommodate this. What port number should he ensure is open?
  62. Which of the following WAN transmission methods provides a type of cell-switching network using fixed length cells and provides very high-speed WAN bandwidth?
  63. Which of the following VPN protocols provides the most compatibility for third party operating systems and remote access clients?
  64. You are a network administrator for your company. You have been asked to implement password-based authentication that is supported on Windows and non-Windows clients for your remote access solution. Which of the following password-based authentication protocols should you choose?
  65. Which of the following connectivity methods is often used for small business and homes in order to connect to a public carrier, but could also be used as a backup connection for larger companies providing a dedicated and guaranteed amount of bandwidth?
  66. You are the network administrator for your company and are managing remote access clients. Clients are using smart cards for authentication on the Internal network and you would like to extend that protection to remote access clients. Which authentication protocol is required in order to implement smart card authentication for VPN clients?
  67. You are evaluating VPN protocols for remote access to your Windows Server 2008 network infrastructure. Which of the following VPN protocols provides the easiest administration of firewalls?
  68. Which of the following protocols is an industry standard providing centralization of AAA for all remote access clients and wired hosts?
  69. The term used for the study of various network activities is:
    Traffic analysis
  70. Freeware utilities are less capable than other, more expensive utilities.
  71. Which of the four primary monitoring tools in Windows breaks down the four major subsystems?
    Resource Monitor
  72. Which of the following types of upgrades applies to a particular device on a personal computer and usually provides additional features and performance enhancements?
    Device driver update
  73. You are attempting to monitor security on a particular system and would like to ensure that only the required services are running. Which of the following tools will be the most useful?
    Port Scanner
  74. You need to determine which system on your network is consuming the most bandwidth. Which of the following types of tools/reports will be the most useful?
    Traffic monitoring
  75. Which of the following utilities provides notifications when system and application errors occur?
    Event Viewer
  76. Which of the following terms is used to identify the various options that can be configured and monitored on a system using SNMP?
  77. You are using the tool Microsoft Message Analyzer to monitor your system. Which of the following type of tool is this?
    Packet analyzer
  78. Which of the following can be used to view errors and warnings from multiple logs in a single results pane?
    Custom view
  79. Which of the following elements of a monitoring strategy is used to provide a report of normal operational values that can be used in troubleshooting and interpreting real-time data?
  80. Which of the following components is used in Windows Server to provide a single component containing performance counters and system configuration events?
    Data Collector Sets
  81. Which of the following is an application later protocol in TCP/IP that provides centralized management of a wide variety of network devices and systems?
  82. Wireless devices communicate with one another through what?
  83. ___ technologies are often used for remote controls.
  84. Ad hoc networks require access points to provide connectivity directly between two nodes.
  85. Which of the following would be utilized in an enterprise network to provide centralized authentication for wireless clients and single sign on?
  86. Which of the following wireless network protocols is the newest standard providing 200+ Mbps transfer rates over radio frequencies operating on the 2.4GHz band or the 5.0 GHz band?
  87. Which of the following is the standard name for Bluetooth wireless connections?
  88. Which of the following WLAN modes would not require access points but instead would focus on connecting individual devices?
    Ad hoc
  89. Which of the following wireless technologies provides slow transfer over short distances and is primarily used for mobile device connectivity?
  90. Which of the following security protocols should not be used due to the fact that it is susceptible to IV attacks?
  91. Which of the following devices is used in infrastructure WLANs to connect wireless clients to the wired network devices and connections?
  92. Which of the following wireless protocols suffers from fewer interference problems and can be used when required to provide up to 54Mbps transfer rates?
  93. A vulnerability is any event or action that might cause a breach or violation in security policies.
  94. Cryptography is nearly as old as language itself
  95. ___ is the inability of a person or organization to disown its own data.
  96. Which of the following is not part of the CIA traid?
  97. What is the first ?AjQuery110106040322087184438_1510537247243
  98. Which of the following DMZ configurations provides the highest level of security while still allowing Internet access for LAN computers without the use of protocol switching?
  99. Which of the following attacks targets the availability of a particular technology in an effort to remove a device or application from service?
  100. Which of the following policies is used to ensure that system configuration changes are proposed, approved, and documented in a consistent way?
    Change management
  101. A firewall capable of examining data streams and performing more advanced security checks is referred to as which of the following devices?
  102. Which of the following malware types is typically hiding inside another program and will often cause identity theft and/or unauthorized remote access to the infected computer?
  103. Which of the following would be considered an attack on the human element of network security?
  104. Which of the following is the primary device that is used to secure the internal network from the Internet?
  105. Which of the following network attacks consists of an attacker capturing network packets for a data stream between two other computers?
  106. Which of the following security policies is used to provide information for end users in regards to the way in which computer equipment is to be used?
    Acceptable use
  107. Which of the following protocols are included in IPSec?
    Authentication Headers (AH), Encapsulating Security Payload (ESP)
  108. Demultiplexing is a method by which multiple analog signals or digital streams are combined into one signal over a shared medium. True or False?
  109. Which type of communication is one-to-everyone?
  110. In a ___ environment, each individual node manages its own security.
  111. The topology of the network relates to its actual layout either logically or physically. True or False?
  112. Which numbering system only uses zeros and ones?
  113. Which of the following policies is used to determine who can make VPN connections to the system and might have physical policies as well as electronic equivalents?
    Remote access policy
  114. Which of the following should you consult when dealing with harmful materials that might be toxic?
  115. Which of the following primarily uses wireless technologies and includes mobile devices, smart phones, and personal computers?
  116. Which of the following is an acronym describing control systems for industrial networks?
  117. Which of the following layers in the OSI/RM provides protocols like HTTP, DNS, DHCP, etc?
  118. Which of the following is the first step in dealing with a Class C fire?
    Remove the power source
  119. Which of the following components of change management represents a change request that is raised by end users, management, or administrative personnel?
  120. Which of the following OSI/RM layers primarily looks at MAC addresses to determine the forwarding of packets?
    Data Link
  121. Multimeters are capable of reading voltage, current, and resistance.
  122. What is the final step of troubleshooting methodology?
    Implement a solution
  123. There is only one troubleshooting model.
  124. Which of the following tools would be used to attach RJ-45 connectors to Ethernet cables using the EIA/TIAB wiring standard?
  125. Which of the following tools is used to eliminate any cached DNS entries on a client that is having trouble connecting to Internet websites?
    Ipconfig /flushdns
  126. Which of the following utilities can you use to determine the number of active network connections that are in place for a host system?
  127. Which of the following tools can verify connectivity and the route a packet takes to the remote network but is often blocked by perimeter firewalls or routers?
  128. Which command-line tool is used to verify the IP Configuration on Unix and Linux systems?
  129. A customer is having a problem with network connectivity to the Internet and you are troubleshooting over the phone. Which of the following is the first action that you should take?
    Identify the affected area
  130. Which parameter will show the DNS client resolver cache when used with IPconfig?
  131. Which of the following is a problem unique to troubleshooting WLANs?
    Signal strength
  132. Which of the following terms describes interference between neighboring signals on Ethernet wiring that occurs closest to the source system?
  133. Which of the following tools could be used to determine if there are physical problems with copper Ethernet cabling?
  134. Server rooms should be secured using locks and a form of access control. True or False?
  135. What can become a single point of failure if we are not careful?
  136. What is critical for keeping servers at an acceptable temperature?
  137. What is the component that is used to connect workstation drop cables to network switches?
    Patch panel
  138. What might be used in a server room to ensure that you can provide defense against flooding?
    Drop floors
  139. Which device provides battery backup capabilities for servers in most LAN infrastructures?
  140. What is incredibly important in larger scenarios to ensure that you can locate the correct cables and ports in the wiring closet?
  141. What term is used to describe the cables that are used to connect workstations to the patch panel?
    Drop cables
  142. Which of the following components is used to extend workstation drops throughout a building?
  143. What is often used in data centers in order to ensure the appropriate environmental climate for efficiently running servers?
    HVAC units
  144. Which of the following components represents the point at which the company equipment interfaces with the provider?s equipment?
    Demarcation point
  145. Virtualization has a large effect on user experience.
  146. Which of the three main types of storage uses storage on a physical server?
    Direct attached storage
  147. Which is a type I hypervisor platform?
    VMWare ESX Server
  148. A single physical host server operates as a host for multiple virtual machines. True or False?
  149. Which of the following virtualization platforms is a Type I Hypervisor?
    Hyper V
  150. Which of the following file types is not a type of virtual hard drive?
  151. Which Windows operating system has the ability to function as an iSC SI target creating a complete Microsoft-based storage solution?
    Windows Server 2012
  152. Which protocol is used unified communications to actually transport voice data over Ethernet?
  153. Which of the following options available with virtual machines is a backup, providing the ability to restore a virtual machine to a previous point in time?
  154. Which of the following Microsoft offerings represents a software as a service model?
    Office 365
  155. Which protocol is used by unified communications to establish a session between the caller and recipient?
  156. Which of the following is required for unified communications if you are using an older PBX style phone system?
  157. Which cloud services model allows you to create virtual machines and virtual networks in the public cloud?
  158. What do you need to enable on the host system in order to be able to use some advanced virtualization features?
    CPU Virtualization in the BIOS
Card Set:
2017-11-13 01:56:07

Flashcards for the Final in Information System Research
Show Answers: