Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?
|
255.255.252.0
|
|
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?
|
smurf attack
|
|
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
|
False
|
|
What team member role coordinates the resources necessary to solve a problem?
|
Manager |
|
SNMP agents receive requests from an NMS on what port number?
|
161 |
|
What is the size of an ATM packet?
|
53 bytes
|
|
The carrier's endpoint on a WAN is called the Data Communications Equipment (DCE).
|
True |
|
STP selects the root bridge based on what option below?
|
bridge ID (BID)
|
|
What protocol is commonly used to aggregate / bond T-1 / T-3 lines?
|
MLPPP
|
|
Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
|
TEMPEST
|
|
In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed?
|
media gateway controller
|
|
If a destructive program is running that might be destroying evidence, what should be done?
|
Pull the power cable
|
|
A CIDR block of /26 is equivalent to what subnet mask below?
|
255.255.255.192
|
|
Only Class B and Class C networks can be subnetted.
|
False |
|
A network with 6 bits remaining for the host portion will have how many usable hosts?
|
62 |
|
Botnets often make use of what chat protocol in order to receive commands?
|
IRC |
|
What authentication protocol sends authentication information in cleartext without encryption
|
PAP
|
|
What xDSL standard is the most popular?
|
ADSL |
|
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
|
802.1Q
|
|
Different types of organizations have similar levels of network security risks.
|
False |
|
Which network type allows a vNIC to access a network directly using the host machine's NIC?
|
bridged mode
|
|
In computer forensics, hidden data such as deleted files and file fragments are known as what term?
|
ambient data
|
|
WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.
|
False
|
|
Any device in an ICS that is motorized and can control the physical system is called a fieldbus.
|
False
|
|
The combination of a public key and a private key are known by what term below?
|
key pair
|
|
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
|
phishing
|
|
An active card, which contains an internal battery, can provide a usable range of up to what distance?
|
150 m
|
|
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
|
virtual wire mode
|
|
What team member role focuses on only one thing: solving the problem as quickly as possible?
|
technical support specialist
|
|
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
|
True
|
|
What feature on some network switches can be used to detect faked arp messages?
|
dynamic ARP inspection
|
|
T -1 cables cannot utilize straight through cables using the same wiring scheme as LAN patch cables.
|
False
|
|
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
|
SSTP
|
|
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
|
jabber
|
|
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
|
True
|
|
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
|
IPSec
|
|
What type of physical security solution involves a device that scans an individual's unique physical characteristics?
|
biorecognition access
|
|
In what type of topology is each site connected to two other sites, providing redundancy?
|
ring topology
|
|
What is the maximum throughput of a DS3 connection?
|
44.736
|
|
On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling
|
SS7
|