• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

1 CH 2
Which of the following devices is the most capable of providing infrastructure security?

1
A) Hub
B) Switch
C) Router
D) Modem
1) C
Routers can be configured in many instances to act as packet-filtering firewalls. When configured properly, they can prevent unauthorized ports from being opened.
2 CH 2
Upper management has decreed that a firewall must be put in place immediately, before your site suffers an attack similar to one that struck a sister company. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs which function?
2
A) Prevents unauthorized packets from entering the network
B) Allows all packets to leave the network
C) Allows all packets to enter the network
D) Eliminates collisions in the network
2) A
Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a type of firewall that blocks specified port traffic.
3 CH 2
Which device stores information about destinations in a network?
3
A) Hub
B) Modem
C) Firewall
D) Router
3) D
Routers store information about network destinations in routing tables. Routing tables contain information about known hosts on both sides of the router.
4 CH 2
As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You’re preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency?
4
A) Hub
B) Switch
C) Router
D) PBX
4) B
Switches create virtual circuits between systems in a network. These virtual circuits are somewhat private and reduce network traffic when used.
5 CH 2
Which device is used to connect voice, data, pagers, networks, and almost any other conceivable application into a single telecommunications system?
5
A) Router
B) PBX
C) Hub
D) Server
5) B
Many modern PBX (private branch exchange) systems integrate voice and data onto a single data connection to your phone service provider. In some cases, this allows an overall reduction in cost of operations. These connections are made using existing network connections such as a T1 or T3 network.
6 CH 2
Most of the sales force have been told that they should no longer report to the office on a daily basis. From now on, they’re to spend the majority of their time on the road calling on customers. Each member of the sales force has been issued a laptop computer and told to connect to the network nightly through a dial-up connection. Which of the following protocols is widely used today as a transport protocol for Internet dial-up connections?
6
A) SMTP
B) PPP
C) PPTP
D) L2TP
6) B
PPP can pass multiple protocols and is widely used today as a transport protocol for dial-up connections.
7 CH 2
Which protocol is unsuitable for WAN VPN connections?
7
A) PPP
B) PPTP
C) L2TP
D) IPSec
7) A
PPP provides no security, and all activities are unsecure. PPP is primarily intended for dial-up connections and should never be used for VPN connections.
8 CH 2
You’ve been given notice that you’ll soon be transferred to another site. Before you leave, you’re to audit the network and document everything in use and the reason why it’s in use. The next administrator will use this documentation to keep the network running. Which of the following protocols isn’t a tunneling protocol but is probably used at your site by tunneling protocols for network security?
8
A) IPSec
B) PPTP
C) L2TP
D) L2F
8) A
IPSec provides network security for tunneling protocols. IPSec can be used with many different protocols besides TCP/IP, and it has two modes of security.
9 CH 2
A socket is a combination of which components?
9
A) TCP and port number
B) UDP and port number
C) IP and session number
D) IP and port number
9) D
A socket is a combination of IP address and port number. The socket identifies which application will respond to the network request.
10 CH 2
You’re explaining protocols to a junior administrator shortly before you leave for vacation. The topic of Internet mail applications comes up, and you explain how communications are done now as well as how you expect them to be done in the future. Which of the following protocols is becoming the newest standard for Internet mail applications?
10
A) SMTP
B) POP
C) IMAP
D) IGMP
10) C
IMAP is becoming the most popular standard for email clients and is replacing POP protocols for mail systems. IMAP allows mail to be forwarded and stored in information areas called stores.
11 CH 2
Which protocol is primarily used for network maintenance and destination information?
11
A) ICMP
B) SMTP
C) IGMP
D) Router
11 A
ICMP is used for destination and error reporting functions in TCP/IP. ICMP is routable and is used by programs such as Ping and Traceroute.
12 CH 2
You’re the administrator for Mercury Technical. A check of protocols in use on your server brings up one that you weren’t aware was in use; you suspect that someone in HR is using it to send messages to multiple recipients. Which of the following protocols is used for group messages or multicast messaging?
12
A) SMTP
B) SNMP
C) IGMP
D) L2TP
12 C
IGMP is used for group messaging and multicasting. IGMP maintains a list of systems that belong to a message group. When a message is sent to a particular group, each system receives an individual copy.
13 CH 2
IPv6, in addition to having more bits allocated for each host address, also has mandatory requirements built in for which security protocol?
13
A) TFTP
B) IPSec
C) SFTP
D) L2TP
13 B
The implementation of IPSec is mandatory with IPv6. While it is widely implemented with IPv4, it is not a requirement.
14 CH 2
Which ports are, by default, reserved for use by FTP? (Choose all that apply.)
14
A) 20 and 21 TCP
B) 20 and 21 UDP
C) 22 and 23 TCP
D) 22 and 23 UDP
14 A
FTP uses TCP ports 20 and 21. FTP does not use UDP ports.
15 CH 2
Which of the following services use only TCP ports and not UDP?
15
A) IMAP
B) LDAP
C) FTPS
D) SFTP
15 D
SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports.
16 CH 2
Which of the following can be implemented as a software or hardware solution and is usually associated with a device—a router, a firewall, NAT, and so on—and used to shift a load from one device to another?
16
A) Proxy
B) Hub
C) Load balancer
D) Switch
16 C
A load balancer can be implemented as a software or hardware solution, and is usually associated with a device—a router, a firewall, NAT, and so on. As the name implies, it is used to shift a load from one device to another.
17 CH 2
Which of the following are multiport devices that improve network efficiency?
17
A) Switches
B) Modems
C) Gateways
D) Concentrators
17 A
Switches are multiport devices that improve network efficiency. A switch typically has a small amount of information about systems in a network.
18 CH 2
Which service(s), by default, use TCP and UDP port 22? (Choose all that apply.)
18
A) SMTP
B) SSH
C) SCP
D) IMAP
18 B/C
Port 22 is used by both SSH and SCP with TCP and UDP.
19 CH 2
What protocol, running on top of TCP/IP, is often used for name registration and resolution with Windows-based clients?
19
A) Telnet
B) SSL
C) NetBIOS
D) TLS
19 C
NetBIOS is used for name resolution and registration in Windows-based environments. It runs on top of TCP/IP.
20 CH 2
How many bits are used for addressing with IPv4 and IPv6, respectively?
20
A) 32, 128
B) 16, 64
C) 8, 32
D) 4, 16
20 A
IPv4 uses 32 bits for the host address, while IPv6 uses 128 bits for this.