Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Practice A incorrect

Network +

QuestionAnswer
Which of the following techniques helps in providing integrity to data transmissions crossing a network? Flood Guard BContent caching CHashing DCaptive portal Hashing after calculating the same hash digest, it is found that the data has not been modified in transit and the integrity of the data has been maintained.
An organization, running at two sites, has the same company image and has implemented same group policy. Users at one site notice a large amount of malware and virus incidents but hardly any at anothe Which of the following has most likely been implemented at the site with the least security incidents? AVulnerability analysis BEnd-user awareness training CBusiness continuity measures DConsent to monitoring End-user awareness training (End-user awareness training is an important aspect when handling network threats. Users should have security awareness training and should have accepted and signed acceptable use policy (AUP) agreements
An organization needs a centrally located firewall that can block specific incoming and outgoing traffic and check each packet individually. Which of the following types of firewalls should a network technician install? A stateless network-based firewall is used in companies or organizations to protect the private network from public networks.
A network technician is setting up a new network. To eliminate single points of failure from the design, he wants to include redundant paths in the network. However, he also wants to prevent performance degradation. Which of the following should he implement to accomplish this? ALACP BSTP CVLAN DPort mirroring STP (Spanning Tree Protocol) to prevent performance degradation that could result from redundant paths in the network.
Which of the following connectors are used with fiber-optic cables? Each correct answer represents a complete solution. Choose all that apply. F-Type B SC C ST D MT-RJ B,C,D
Which of the following Application layer protocols is not connection-oriented? ATelnet BHTTP CTFTP DFTP trivial File Transfer Protocol (TFTP) works at the Application layer and uses UDP port 69. It is considered unreliable and not connection-oriented.
A network technician while troubleshooting a Layer 1 issue finds that two switches connected through a straight-through cable are unable to communicate. What can be the possible cause of this issue? MDIX is enabled on both the switches
The maximum speed of 802.11b is ___ A54 Mbps B11 Mbps C155.52 Mbps D51.84 Mbps 11 Mbps
Which of the following firewalls inspects actual contents of packets/traffic?Packet filtering B Stateful inspection C Circuit-level D Application layer Application layer An application layer firewall is a computer networking firewall that operates at the application layer of the TCP/IP stack. It is also known as a proxy-based firewall,
On which of the following types of cabling is an F-connector used?CAT3 BCAT5 CSingle mode fiber DRG-6 usually with an RG-6 cable
What is the default port number for SSH? 21 B443 C80 D22 22
In a TCP/IP-based network, you configure the default mask for a host having the IP address 193.100.154.1. What will be the network ID of the host? 193.100.154
How does a DHCP reservation work? It matches a specific MAC address to a specific IP address. A DHCP reservation works by matching a specific MAC address to a specific IP address. This address will not be assigned to any other network device on the network. It is a static IP address assignment.
At which layer of OSI is the Frame Check Sequence for error detection performed? Layer 2
What default subnet mask is used with the Class C private IP address range?A 255.0.0.0 B 255.255.255.255 C 255.255.255.0 D 255.255.0.0 255.255.0.0
You work as a network administrator for a company. The company has a TCP/IP-based network. Users on the network are complaining that they're unable to connect to the Web server hosted on the Intranet by using its host name. You find that users can access the server by using its IP address. What is the most likely cause of the issue? The DNS server is unavailable. BThe DHCP server is unavailable. The domain controller is unavailable. he WINS server is unavailable. The DNS server is unavailable.
Which of the following are common optical carrier levels (OC-x)? Each correct answer represents a complete solution. Choose three. OC-12 B OC-192 C OC-1 D OC-4 A OC-12 B OC-192 C OC-1
You need to check the speed and condition of the signal on a copper cable. Which device should you use?Loopback plug BMultimeter COTDR DTDR A time-domain reflectometer (TDR) is a tool that finds and describes faults in metallic cables like twisted-pair and coax and can provide information regarding the speed and condition of the signal on the wire.
You need to transfer files between two systems. Which of the following protocols can be used? Each correct answer represents a complete solution. Choose two. SCP B RIP C NTP D FTP E OSPF scp secure copy protocol ftp file transfer protocol
Which of the following are uses of a VPN concentrator? Each correct answer represents a complete solution. Choose all that apply. Performs authentication for each VPN tunnel BProvides data encryption CAllows remote users to build a VPN tunnel DResolves a domain name into a corresponding IP address Performs authentication for each VPN tunnel B Provides data encryption C Allows remote users to build a VPN tunnel
Which of the following connectors will be used to connect a serial port and an Ethernet port on a switch? Each correct answer represents a part of the solution. Choose all that apply. AST BLC CDB-9 DRJ-45 CDB-9 DRJ-45
A network technician has recently installed a new wireless access point on the company's wireless network. All the settings for the new access point were copied from the baseline. Due to this change, the network technician is getting reports from the sales department that they are having irregular wireless connectivity, while other departments are having no such problem. What can be the possible cause of this issue? Incorrect AP placement BIncorrect SSID CChannel mismatch DIncorrect WAN standard
Incorrect AP placement Incorrect AP placement can be the possible cause of the issue. Wireless APs should be strategically located in a building to provide sufficient coverage to all desired coverage areas
When would you possibly find Frame Relay being utilized in a corporate network to help save money? Each correct answer represents a complete solution. Choose all that apply. ans: C When a centralized office needs to communicate with many branch offices D When a full mesh of WAN links is in place
Which of the following devices must be used to have full duplex communication between two host devices? Firewall BHub CRepeater DSwitch Switch
What are the effects of having a CSMA/CD network that has sustained heavy collisions?Each correct answer represents a complete solution. Choose all that apply. Low throughput Delay Loss of signal strength Congestion Delay Low throughput Congestion
Created by: adawa
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards