Term
The IoT refers to the network of physical smart, connected objects that are embedded with electronics, software, sensors, and network connectivity. T/F |
|
Definition
|
|
Term
An autonomous system (AS) is a group of contiguous IP address ranges under the control of a single internet entity. Individual autonomous systems are assigned a 16-bit or 32-bit AS number (ASN) that uniquely identifies the network on the internet. ASNs are assigned by the Internet Assigned Numbers Authority (IANA). T/F |
|
Definition
|
|
Term
Which DNS record type specifies authoritative information about a DNS zone such as a primary name server, email address of the domain administrator, and domain serial number? CNAME (Canonical Name) NS (Name Server) PTR (Pointer) SOA (Start for Authority) |
|
Definition
|
|
Term
Which of the following are dynamic routing protocols? (Choose 4) DHCP Border Gateway Protocol(BGP) Open Shortest Path First (OSPF) Split Horizon Routing Information Protocol (RIP) EIGRP |
|
Definition
|
|
Term
Which protocol requires every router to calculate and maintain a complete map, or routing table, of the entire network? Distance-vector Static Link State Convergence |
|
Definition
|
|
Term
This type of extranet will allow businesses within an industry to share information or integrate shared business processes. Metropolitan Area Network (MAN) Campus Area Network (CAN) Value Add Network (VAN) Storage Area Network (SAN) |
|
Definition
|
|
Term
A domain name registrar is an organization that is accredited by a top-level domain (TLD)registry to manage domain name registrations. T/F |
|
Definition
|
|
Term
HTTPS is an appplication protocol used to transfer clear text data between web servers and web browsers. T/F |
|
Definition
|
|
Term
Select the appropriate slash notation for an IPv4 class C address. /16 /24 /32 /8 |
|
Definition
|
|
Term
Variable length subnet masking (VLSM) aggregates multiple continuous smaller networks into a larger network to enable more efficient internet routing. T/F |
|
Definition
|
|
Term
Which option is an example of a logical address? MAC address IP address Burned-In address Physical address |
|
Definition
|
|
Term
A default gateway is a network device, such as a router or switch, to which an endpoint sends network traffic when a specific destination IP address is not specified by an application or service, or when the endpoint does not know how to reach a specified destination. T/F |
|
Definition
|
|
Term
Identify the broadcast address from the following: 214.19.21.255/14 192.168.12.127/25 192.168.0.255/16 10.24.36.48/28 |
|
Definition
|
|
Term
Select the subnet mask for a class A address. 255.255.255.0 255.255.0.0 255.0.0.0 255.255.255.255 |
|
Definition
|
|
Term
An IPv6 address is made up of how many bits? 48 256 32 128 64 |
|
Definition
|
|
Term
Which subnet is 172.168.33.20/20 on? 172.168.8.0 172.168.0.0 172.168.32.0 172.168.16.0 |
|
Definition
|
|
Term
Which subnetwork is 192.168.25.50/28 on? 192.168.0.0 192.168.25.64 192.168.25.48 192.168.25.0 |
|
Definition
|
|
Term
Select the appropriate 1st octet associated with an IPv4 class B address: 10 255 172 192 |
|
Definition
|
|
Term
Which term refers to stripping header information as a PDU is passed from one layer to a higher layer? de-encapsulation packetization PDU stripping encapsulation |
|
Definition
|
|
Term
At which OSI layer does the PDU contain sequence and acknowledgement numbers? Application Data Link 6 4 |
|
Definition
|
|
Term
The OSI Application layer manages encryption and formatting. T/F |
|
Definition
|
|
Term
HTTP interacts with which OSI layer: Physical Session Application Data Link |
|
Definition
|
|
Term
Which layer of the OSI model does Project 802 divide into two sublayers? Physical Data Link Session Network |
|
Definition
|
|
Term
Which OSI layer determines the route a packet takes from sender to receiver? 3 7 4 1 |
|
Definition
|
|
Term
Which of the following problems can occur at the Physical layer? Incorrect IP addresses Signal errors caused by noise NIC driver problems |
|
Definition
Signal errors caused by noise |
|
|
Term
Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network? 3 2 6 5 |
|
Definition
|
|
Term
Which OSI layer handles flow control, data segmentation, and reliability? Data link Transport Physical Application |
|
Definition
|
|
Term
At which Data Link sublayer does the physical address reside? Network Access Control (NAC) Media Access Control (MAC) Logical Link Control (LLC) Data Access Control (DAC) |
|
Definition
|
|
Term
Which type of attach is specifically directed at senior executives or other high-profile targets within an organization through email that typically purports to be a legal subpoena, customer complaint, or other serious matter? Whaling Spear phishing Watering hole Pharming |
|
Definition
|
|
Term
New exploits can be crafted from any number of more than a thousand core exploit techniques. T/F |
|
Definition
|
|
Term
Which type of advanced malware uses common techniques to hide certain binary strings that are characteristically used in malware and therefore are easily detected by anti-malware signature, or to hide an entire malware program. Obfuscation Metamorphism Polymorphism Multi-functionality |
|
Definition
|
|
Term
A vulnerability is a small piece of software code, part of a malformed data file, or a sequence (string) of commands created by an attacker to cause unintended or unanticipated behavior in a system or software. T/F |
|
Definition
|
|
Term
Which option is an important characteristic or capability of advanced malware? Multi-functionality Hiding techniques such a polymorphism, metamorphism, and obfuscation Distributed, fault tolerant architecture All the above |
|
Definition
|
|
Term
Which of these protocols is not used for VPNs? ICMP SSTP WEP L2TP PPTP |
|
Definition
|
|
Term
Which of the following is true about ISDN? It uses a terminal adapter to connect to the network It uses a modem to modulate/demodulate the signal Its PRI format provides bandwidth up to 128 Kbps Its BRI format consists of two B-channels and one D-channel |
|
Definition
Its BRI format consists of two B-channels and one D-channel |
|
|
Term
Which of the following combines several communication streams into a single faster communication stream? DSU Demultiplexing Multiplexing CSI |
|
Definition
|
|
Term
Which of the following places data on the local loop? DTE DCE CPE Router |
|
Definition
|
|
Term
Which wireless WAN technology has a standard for fixed and mobile devices? LTE WiMAX LTE-Advanced Satellite |
|
Definition
|
|
Term
Which technology uses 53-byte cells? ATM POTS X.25 Frame relay |
|
Definition
|
|
Term
Which of the following best describes a digital signal? A signal that varies over time continually and smoothly A signal whose states vary much like a lamp controlled by a dimmer switch A series of binary values A channel service unit |
|
Definition
A series of binary values |
|
|
Term
Which VPN mode should you use if you want to establish a secure tunnel between a main office and a branch office? Client-to-gateway Host to site Site-to-site Site to gateway |
|
Definition
|
|
Term
Which procedure specifies what resources users can access and the tasks they can perform on a network? Auditing Authorization Authentication Logon |
|
Definition
|
|
Term
For what purpose is a CSU/DSU used? Routes packets from the LAN to the WAN Create a WAN connection over the public switched telephone network Modulates a digital signal into an analog signal Creates a digital connection between a LAN device and the WAN link |
|
Definition
Creates a digital connection between a LAN device and the WAN link |
|
|
Term
Which wireless WAN technology might not be suitable for voice applications because of latency? LTE WiMAX LTE-Advanced Satellite |
|
Definition
|
|
Term
Which of the following VPN protocols is commonly used for web based VPN connections? SMTP PPTP SSL L2TP |
|
Definition
|
|
Term
Kerberos is a ticket-based authentication protocol in which "tickets" are used to identify network users. T/F |
|
Definition
|
|
Term
Playbooks (or runbooks) are task-based graphic workflows that help visualize processes across security products. These playbooks can be fully automated, fully manual, or anywhere in between. T/F |
|
Definition
|
|
Term
Which of the following is not found in the output of a successful ping reply? The TTL of the reply packet IP address of the responding computer The number of bytes in the ICMP message The sequence number |
|
Definition
|
|
Term
Which TCP/IP layer conflicts are related to changes in encryption keys or updates to service architectures that are not supported by different client devices? Session Transport Presentation Application |
|
Definition
|
|
Term
A directory service is a database that contains information about users, resources, and services in a network. T/F |
|
Definition
|
|
Term
Select the three pillars of security orchestration. People, process, technology Virtualization, storage, cloud SaaS, IaaS, PaaS Software, hardware, storage |
|
Definition
People, process, technology |
|
|
Term
Which command in Linux gives you extensive help on how to use a command? guide help man more |
|
Definition
|
|
Term
A cloud access security broker (CASB) is software that monitors activity and enforces security policies on traffic between an organization's users and cloud-based applications and services. T/F |
|
Definition
|
|
Term
Which problem-solving approach requires a solid understanding of how networks work? Trial and error Step by step with the OSI model Solve by example Replacement method |
|
Definition
Step by step with the OSI model |
|
|