• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
​Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?
​255.255.252.0
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?​
smurf attack​
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.​
False
What team member role coordinates the resources necessary to solve a problem?​

Manager

SNMP agents receive requests from an NMS on what port number?​

161

What is the size of an ATM packet?​
​53 bytes
The carrier's endpoint on a WAN is called the Data Communications Equipment (DCE)​.

True

STP selects the root bridge based on what option below?​
​bridge ID (BID)
​What protocol is commonly used to aggregate / bond T-1 / T-3 lines?
​MLPPP
​Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
TEMPEST
In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed?
media gateway controller
If a destructive program is running that might be destroying evidence, what should be done?​
​Pull the power cable
​A CIDR block of /26 is equivalent to what subnet mask below?
​255.255.255.192
Only Class B and Class C networks can be subnetted.​

False

A network with 6 bits remaining for the host portion will have how many usable hosts?​

62

Botnets often make use of what chat protocol in order to receive commands?​

IRC

What authentication protocol sends authentication information in cleartext without encryption
​PAP
What xDSL standard is the most popular?​

ADSL

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?​
​802.1Q
Different types of organizations have similar levels of network security risks.

False

​Which network type allows a vNIC to access a network directly using the host machine's NIC?
​bridged mode
​In computer forensics, hidden data such as deleted files and file fragments are known as what term?
ambient data
WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.​
False
Any device in an ICS that is motorized and can control the physical system is called a fieldbus.
False
​The combination of a public key and a private key are known by what term below?
​key pair
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?​
​phishing
​An active card, which contains an internal battery, can provide a usable range of up to what distance?
​150 m
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?​
​virtual wire mode
What team member role focuses on only one thing: solving the problem as quickly as possible?​
​technical support specialist
​Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
True
​What feature on some network switches can be used to detect faked arp messages?
​dynamic ARP inspection
T -1 cables cannot utilize straight through cables using the same wiring scheme as LAN patch cables.​
False
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
​SSTP
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
​jabber
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
True
​What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPSec
What type of physical security solution involves a device that scans an individual's unique physical characteristics?​
​biorecognition access
In what type of topology is each site connected to two other sites, ​providing redundancy?
​ring topology
What is the maximum throughput of a DS3 connection?​
​44.736
On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling
​SS7