Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
Which type of network device connects networks having the same or different access methods and media, and forwards packets and frames to networks?a. Switch b. Router c. Bridged. Firewall
Q:
Which type of network device connects two or more cable segments and retransmits any incoming signal to all other segments?a. Hub b. Bridge c. Repeaterd. Switch
Q:
Which type of network device is used to link together network segments in a physical star fashion?a. Hub b. Switch c. Routerd. Bridge
Q:
Which type of network device provides remote communications, such as multiple modems and connections to telecommunications lines?a. Routers b. Firewalls c. Switchesd. Access servers
Q:
What location can NLMs be loaded from when the SECURE CONSOLE command is run?a. sys:system b. DOS partition c. Floppy diskd. CD
Q:
In Netware 6.x, how do you gain access back into the system after the screen saver starts and the screen is locked?
a. Console 1
b. Server Console Authentication dialog box
c. Command line authentication
d. Ctrl+Alt+Del key sequence
Q:
Which NetWare 6.x SCRSAVER command parameter must be used at the time SCRSAVER is loaded and prevents screen locking?a. Disable Lock b. Enable Lock c. No Passwordd. Disable
Q:
Which NetWare 6.x SCRSAVER command parameter entered in seconds, determines the amount of time that the keyboard is inactive before the screen saver starts?a. Auto Clear Delay b. Wait c. Timerd. Delay
Q:
Which NetWare 6.x SCRSAVER command parameter enables the screen saver to work after it has been disabled?a. Activate b. Enable c. Re-enabled. Start
Q:
Which NetWare 6.x SCRSAVER command parameter starts the screen saver immediately and requires a user account and password to go back into the console?a. Delay b. Auto Clear Delay c. Activated. Enable
Q:
Which command in Netware 6.x allows you to configure a screen saver at the console?a. SCRSAVER b. SSAVER c. SCRNSVRd. SCREENSAVER
Q:
Which of the following fire suppression chemicals is considered to be an environmental concern?a. Soda acid b. Halon c. Carbon dioxided. Baking soda
Q:
Which operating system uses XScreenSaver to lock the screen?a. Windows ME b. Red Hat Linux 9.x c. Mac OS Xd. Netware 6.x
Q:
Which of the following operating systems can use screen savers to protect the desktop?a. Windows b. Linux c. Mac OS Xd. All of the above
Q:
A _____ lock consists of a thick cable covered by vinyl, with one end permanently attached to a table or an immobile object.a. hardware b. cable c. cipherd. both a and be. a, b, and c
Q:
What kind of security is related to the purpose and location of a workstation?a. End User b. Desktop c. Workstationd. System
Q:
An advantage of fiber-optic cable is that its high bandwidth and low attenuation (signal loss) enable it to sustain transmissions over long distances. _________________________
Q:
UTP cable is the most frequently used network cable because it is relatively inexpensive and easy to install. _________________________
Q:
When working with twisted-pair cabling, solid shielding is used for indoor wiring, and corrugated shielding is used for outside or underground wiring. _________________________
Q:
Twisted-pair cabling is more flexible than coax cable and therefore better for running through walls and around corners. _________________________
Q:
Twisted-pair cable is used mainly in older LANs and in LANs that exist in areas with strong sources of signal interference. _________________________
Q:
A(n) trunkis a high-capacity communications medium that joins networks and central network devices on the same floor in a building, on different floors, and across long distances. _________________________
Q:
It is more difficult with a(n) star topology than with the traditional bus topology for someone to create an unauthorized tap into the network, because they need access to the central hub or switch. _________________________
Q:
Newer high-speed ring technologies employ three loops for redundant data transmission. _________________________
Q:
In a bus topology, a terminator is connected to each end of the bus cable segment. _________________________
Q:
A(n) intermediate cross-connect is a wiring closet that houses the main-level cables and cables to main networking and telecommunications devices. _________________________
Q:
Coaxial cable (typically called coax) comes in two varieties, thick and thin.
Q:
A disadvantage of a bus network is that it requires more cable than does the traditional star.
Q:
The star topologyis the oldest communications design, with roots in telephone switching systems.
Q:
The bus topology is easier to manage than the ring topology because the equipment used to build the bus makes it easier to locate a defective node or cable problem.
Q:
A bus network segment must be within the IEEE length specifications to ensure that packets arrive in the expected time.
Q:
What four tasks is Windows XP Internet Connection Firewall designed to handle?
Q:
What are the six ways that a metric can be calculated?
Q:
What six tasks do routers perform?
Q:
What four tasks can a proxy fulfill?
Q:
What are the four ways to perform network address translation?
Q:
Firewalls provide border security by using three different approaches. What are they?
Q:
What five border points should be protected by a strong border security design?
Q:
What four fields does a UDP header contain?
Q:
What are the three component protocols within the TCP/IP protocol suite?
Q:
A newer way to ignore address class designation is by using ______________________________addressing, which puts a slash (/) after the dotted decimal notation.
Q:
When an application on a network station uses a(n) ____________________ packet (which is the most typical packet used by an application), one copy of each packet in a transmission is sent to each destination intended to receive the packet.
Q:
When a TCP segment is formatted with the additional IP header information, the entire unit is called a(n) ____________________ or packet.
Q:
UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the ____________________ to ensure reliability.
Q:
TCP (and UDP) ____________________ software may be used to simply collect information about a target, without the target's knowledge; it may be used to gain access to a system, or it may be used to crash a system.
Q:
In a TCP header, the ____________________ is a 16-bit CRCthat is computed by adding the length of all header fields plus the length of the data payload field.6
Q:
In TCP communications, the number of data bytes transmitted in a frame is called the ____________________because the number can be increased or decreased from one moment to the next by mutual agreement of the two communicating stations.
Q:
Connection-oriented services occur between the ____________________ sublayer of the data-link layer (layer 2) and the network layer (layer 3) in the OSI model.
Q:
Red Hat Linux 9.x offers the ____________________ interface for configuring NAT and complex firewall security from the command line in a terminal window.
Q:
When a server is set up for ______________________________, it performs address translation between the local network clients (including the server as an Internet user) and the Internet.
Q:
Is Internet Connection Firewall available in Windows Server 2003, Enterprise Edition?
Q:
Can routers filter packets on the basis of information associated with each port (inbound and outbound connections) to control network traffic?
Q:
Does RIP have the ability to send only routing updates to other routers instead of the entire routing table?
Q:
Do routers maintain information about network station addresses and network status in databases?
Q:
Is one function of a proxy to screen application requests that go across a firewall placed between an internal network and an external or public network?
Q:
Does dynamic NAT translate a range of addresses on the internal network to a range of specific decoy addresses?
Q:
Does NetBEUI use the type of addressing that would enable it to be forwarded or routed to networks other than the one on which it is used?
Q:
Are network classes A through C intended for unicast addressing methods?
Q:
Does UDP provide the same level of reliability and error checking as TCP?
Q:
When two devices communicate using connection-oriented methods, do they establish sequence numbers for each frame that is transmitted and place the sequence number in the frame header?
Q:
What is displayed in the figure above?a. OSPF border areasb. Using NAT on a small office networkc. Proxy firewall as an application-level gatewayd. Firewall proxy as a circuit-level gateway
Q:
What is displayed in the figure above?a. Proxy firewall as an application-level gatewayb. Firewall proxy as a circuit-level gatewayc. OSPF border areasd. Implementing border security
Q:
In the figure above, which letter indicates the portion of the TCP/IP packet that is the TCP segment?a. A b. A and B c. B and Cd. C and D
Q:
IPTables is used to configure firewall and NAT activities in which of the following operating systems?a. Windows 2000 Server b. Windows Server 2003 c. Mac OS Xd. Red Hat Linux
Q:
When using the Red Hat Linux 9.x Security Level Configuration tool, which security level only allows connections for using DNS and DHCP services?a. High b. Medium c. Lowd. No Firewall
Q:
Q:
What is the only metric used by the RIP routing protocol?
a. Bandwidth
b. Size of the packet
c. Number of incoming packets waiting to be processed
d. Number of hops
Q:
Which of the following can be used to calculate a metric?a. Number of hops b. Size of the packet c. Bandwidthd. Both a and be. a, b, and c
Q:
Which type of proxy stores recently made service requests, allowing them to fulfill an individual client's request without needing to contact the server on the internal network?a. Application-level gateway b. Circuit-level gateway c. Cachingd. Firewall
Q:
Which type of NAT is used when the firewall is connected to multiple public networks or Internet service providers, and thus there is a range of different decoy addresses used for each external network?a. Network redundancy translation b. Dynamic translation c. Static translationd. Load balancing
Q:
Which type of packet filtering tracks information about a communication session, such as which ports are in use, drawing from the contents of multiple packets?a. Ingress b. Stateful c. Statelessd. Source route
Q:
You have configured a firewall to block Telnet and SSH communications by blocking the TCP and UDP ports 22 and 80. Will this accomplish the job?
a. Yes
b. No, because it is also necessary to block port 443 for FTP
c. No, because SSH is still not blocked
d. No, because Telnet is still not blocked
Q:
What protocol was used extensively for versions of NetWare prior to version 5?a. UDP b. IPX c. TCP/IPd. NetBEUI
Q:
If you required 1000 IP host identities for your network, which of the following CIDR addresses would be valid if you want to make the best use of IP addressing?a. 161.15.37.16/12 b. 161.15.37.16/20 c. 161.15.37.16/22d. 161.15.37.16/25
Q:
Which of the following is the loopback address?a. 127.0.0.0 b. 172.0.0.1 c. 172.0.0.0d. 127.0.0.1
Q:
What is the default subnet mask for a Class D network?a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0d. 255.255.255.224e. None of the above
Q:
Which of the following is the proper range for a Class D network?a. 1.0.0.0 - 126.255.255.255 b. 128.0.0.0 - 191.255.255.255 c. 192.0.0.0 - 223.255.255.255d. 224.0.0.0 to 239.255.255.255
Q:
How many station addresses are available in a Class B network?a. 254 b. 65,232 c. 65,534d. 63,535
Q:
When using Class B addressing, which portion of the IP address 140.26.23.48 is the network address?a. 140 b. 140.26 c. 140.26.23d. 26.23
Q:
When using classful addressing, the IP address 122.16.232.4 belongs to which network class?a. A b. B c. Cd. D