click below
click below
Normal Size Small Size show me how
network midterm
kunware midterm
| Question | Answer |
|---|---|
| Assures users of timely and reliable access to data services for authorized users. Security Availability Scalability | Availability |
| Extend LAN access technology into the WAN. DSL Metro Ethernet Internet | Metro Ethernet |
| A worldwide collection of interconnected networks. Intranet Extranet Internet | Internet |
| Confidentiality, integrity, and availability are requirements of which characteristic of network architecture? Performance Security Reliability | Security |
| Means that only the intended and authorized recipients can access and read data. Integrity Availability Confidentiality | Confidentiality |
| Provide high bandwidth, high availability, always-on internet over a telephone line. Dial Up DSL Cable | DSL |
| Which feature describes using personal tools to access a business or campus network? Cloud Computing BYOD VPN | BYOD |
| An inexpensive internet option that uses a phone line and modem with low bandwidth. DSL Dial Up Satellite | Dial Up |
| Which applications protect devices from malicious software? Firewall Antivirus and antispyware VPN | Antivirus and antispyware |
| Identify the end device. Router Printer Switch | Printer |
| Which network characteristic limits affected devices during failure and allows recovery? Scalability Fault Tolerance Security | Fault Tolerance |
| Which feature connects a device using an electrical outlet? Wireless Powerline Fiber | Powerline |
| Which attack steals login credentials to access private data? Phishing Identity Theft DoS | Identity Theft |
| Which attack captures private data from an organization’s network? Spoofing Data interception and theft Malware | Data interception and theft |
| Redundancy with multiple paths to a destination is which characteristic? Availability Fault Tolerance Scalability | Fault Tolerance |
| Which option blocks unauthorized network access? Antivirus Firewall Hub | Firewall |
| What are all computers participating directly in network communication called? Nodes Hosts Servers | Hosts |
| Which policy prioritizes voice traffic during congestion? NAT Quality of Service ACL | Quality of Service |
| Identify the intermediary device. Router Laptop Printer | Router |
| Devices that connect individual end devices to the network. End devices Intermediary devices Servers | Intermediary devices |
| Which feature supports conferencing over long distances? Email Video Communications Chat | Video Communications |
| Identify the intermediary device. Switch Hub Modem | Hub |
| Which characteristic allows a network to expand quickly? Security Scalability Availability | Scalability |
| Which assures information is not altered in transit? Confidentiality Integrity Availability | Integrity |
| Which infrastructure provides secure access to external organizations? Internet Extranet Intranet | Extranet |
| Which feature includes Public, Private, Hybrid, and Custom? Virtualization Cloud Computing BYOD | Cloud Computing |
| Which topology shows physical device locations and cabling? Logical topology Physical topology Network map | Physical topology |
| Which software secretly collects user information? Firewall Spyware and Adware Antivirus | Spyware and Adware |
| Which feature uses cellular technology like smartphones? DSL Wireless Broadband Satellite | Wireless Broadband |
| Which attack slows or crashes applications? Spoofing Denial of Service Phishing | Denial of Service |
| What is a disadvantage of peer-to-peer networking? High cost No centralized administration Complex setup | No centralized administration |
| Which attack crashes equipment and programs? Malware Denial of Service Spyware | Denial of Service |
| Coaxial cable encodes data as: Light pulses Electrical impulses Radio waves | Electrical impulses |
| UTP stands for: Universal Twisted Pair Unshielded Twisted Pair Unterminated Twisted Pair | Unshielded Twisted Pair |
| Which internet connection is offered by cable TV providers? DSL Cable Fiber | Cable |
| Which internet access uses a cell phone network? Satellite Cellular DSL | Cellular |
| What is an advantage of peer-to-peer networking? Centralized control Easy to set up High security | Easy to set up |
| The source or destination of a network message is called: Router End Device Switch | End Device |
| Which topology shows devices, ports, and addressing? Physical topology Logical topology Cable layout | Logical topology |
| Identify the end device. Router Laptop Switch | Laptop |
| Which internet type is used where no other connectivity exists? DSL Satellite Cable | Satellite |
| Which attack occurs the day a vulnerability is discovered? Phishing Zero day DoS | Zero day |
| What connects distant offices via rented private circuits? VPN Dedicated Leased Line Metro Ethernet | Dedicated Leased Line |
| Identify the intermediary device. Router Modem Switch | Modem |
| Which option secures remote worker connections? Firewall Virtual Private Network Proxy | Virtual Private Network |
| Which infrastructure serves small geographic areas? WAN LAN MAN | LAN |
| Which describes malicious code on devices? Firewall Virus, worm, or Trojan Horse Spyware | Virus, worm, or Trojan Horse |
| Which organization manages IP addresses and domains? IEEE IANA ISO | IANA |
| Which layer encapsulates data into frames? Network Data Link Transport | Data Link |
| Which two are service discovery protocols? FTP DHCP DNS | DHCP DNS |
| Which protocol guarantees reliable delivery? UDP TCP ICMP | TCP |
| What determines the network portion of an IPv4 address? Gateway Subnet mask MAC address | Subnet mask |
| Which protocols are in the application layer? HTTP DHCP DNS | DHCP DNS |
| Data Link addresses never change end-to-end. True False | False |
| The right-most part of an IP identifies the network. True False | False |
| Frames between different networks go to a default gateway. True False | True |
| EIA develops standards for: Wireless protocols Electric wiring and connectors IP addressing | Electric wiring and connectors |
| Which key completes IOS commands? Enter Tab Ctrl+C | Tab |
| Which command encrypts plaintext passwords? enable secret service password-encryption login | service password-encryption |
| What manages hardware and software interaction? Shell Kernel Firmware | Kernel |
| Which interface manages a Layer 2 switch remotely? Console SVI Ethernet port | SVI |
| Switch> prompt indicates which mode? Global config User EXEC Privileged EXEC | User EXEC |
| A user-defined variable is called: Keyword Argument Command | Argument |
| Command to enter global configuration mode: enable configure terminal interface | configure terminal |
| Which command saves running config to startup config? write memory copy running-config startup-config save config | copy running-config startup-config |
| After changing an IP address, what must be done? Reload device Save config Nothing | Nothing |
| Which device sends traffic to remote networks? Router Local switch Hub | Local switch |
| Which are components of message timing? Flow control Response timeout Access method | Flow control Response timeout Access method |
| Standards organizations are vendor-neutral. True False | True |
| Which delivery sends to all devices? Unicast Broadcast Multicast | Broadcast |
| Transport layer PDU is called: Packet Segment Frame | Segment |
| Which services are provided by the internet layer? IP Routing Messaging | IP Routing Messaging |
| Which step identifies sender and receiver addresses? Encoding Formatting Encapsulation | Formatting |
| Sequencing ensures: Faster transmission Correct reassembly Encryption | Correct reassembly |
| Which organization publishes RFCs? ISO IETF IEEE | IETF |
| How is SSH different from Telnet? SSH encrypts traffic Telnet encrypts traffic Both are secure | SSH encrypts traffic |
| Which IOS mode allows all commands? User EXEC Privileged EXEC Global config | Privileged EXEC |
| Best access method for initial switch setup? Telnet Console SSH | Console |
| A predefined OS parameter is called: Argument Keyword Variable | Keyword |
| Best in-band IOS access? Console Telnet/SSH AUX | Telnet/SSH |
| Which config is stored in RAM? Startup-config Running-config Backup-config | Running-config |
| Physical computer components are called: Software Hardware Firmware | Hardware |
| Which command encrypts plaintext passwords? enable secret service password-encryption login | service password-encryption |
| IPv4 addresses are represented as: Binary strings Four decimals 0–255 Hexadecimal | Four decimals 0–255 |
| Which delivery method sends to some but not all? Broadcast Multicast Unicast | Multicast |
| BGP and OSPF are: Transport protocols Routing protocols Application protocols | Routing protocols |
| Order of MAC addresses in a frame? Source then destination Destination then source Random | Destination then source |
| Which delivery sends to one device? Broadcast Unicast Multicast | Unicast |
| After Ethernet is removed, what is processed next? Transport layer Internet layer IP Application layer | Internet layer IP |
| show startup-config displays: Running config Saved config in NVRAM Interface status | Saved config in NVRAM |
| CLI/GUI request interface is called: Kernel Shell BIOS | Shell |
| User EXEC mode prompt ends with: | > $ |
| Which command deletes startup config? delete config erase startup-config clear config | erase startup-config |
| Kernel function is to: Manage users Provision hardware Encrypt data | Provision hardware |
| Correct IPv4 format: 192.168.0.1 999.10.1.1 192.168.1 | 192.168.0.1 |
| Banner command syntax: banner login banner motd set banner | banner motd |
| UDP and TCP belong to which layer? Internet Transport Application | Transport |
| Which statements about addresses are true? Logical vs physical MAC is hexadecimal IP is 32 or 128 bits | Logical vs physical MAC is hexadecimal IP is 32 or 128 bits |
| Adding headers as data moves down the stack is: Encoding Encapsulation Formatting | Encapsulation |
| Default SVI on a switch is: VLAN 0 VLAN 1 VLAN 99 | VLAN 1 |
| Correct IPv4 format: 192.168.0.5 256.1.1.1 192.168 | 192.168.0.5 |
| Which command shows current config? show startup-config show running-config show interfaces | show running-config |
| Saved configuration file is called: running-config startup-config backup-config | startup-config |
| Which infrastructure spans large geographic areas? LAN WAN MAN | WAN |
| Light pulses use which media? Copper Fiber-optic Wireless | Fiber-optic |
| Which protocols report delivery errors? ICMPv4 ICMPv6 TCP | ICMPv4 ICMPv6 |
| IPv4 structure is called: Binary format Dotted-decimal format Hex format | Dotted-decimal format |
| Which protocol is at the network access layer? IP Ethernet TCP | Ethernet |
| Dividing data before transmission is called: Encoding Segmentation Encapsulation | Segmentation |
| Command to name a switch Sw-Floor-2: switch-name hostname Sw-Floor-2 set hostname | hostname Sw-Floor-2 |
| Which command enables user EXEC password? login enable password | login |
| Which interface has no physical port? Ethernet SVI Console | SVI |
| Command to enter privileged EXEC mode: login enable configure | enable |
| Converting data for transmission is: Encoding Segmentation Formatting | Encoding |
| Mobile devices need IP addresses to communicate. True False | False |
| Running configuration changes: Require reboot Apply immediately Are saved automatically | Apply immediately |
| Why copy startup-config to running-config? To erase config To load saved config into RAM To back up config | To load saved config into RAM |
| Initial secure switch access uses: Telnet Console port SSH | Console port |
| Privileged EXEC access is secured with: enable password enable secret login | enable secret |