Current Location Network+ ITNW1458.20101122.257400 Quizzes & Exams Review Test Submission: Final Exam
.
Menu Management Options
Expand AllCollapse All
..Course Menu:Network+ (ITNW1458.20101122.257400)
Announcements .Instructor .Messaging
--------------------------------------------------------------------------------
.Syllabus .Lessons .Web Based Labs .Presentations .Book Ch 1-6 .Quizzes & Exams .Discussion Board
--------------------------------------------------------------------------------
.Tools .Communications .Plagarism .Non Course Links .Evaluation .Review Test Submission: Final Exam.ContentUser Lucas Schwartz
Submitted 2/2/11 7:27 PM
Name Final Exam
Status Completed
Score 226 out of 300 points
Time Elapsed 57 minutes, and 55 seconds out of 2 hours.
Instructions
Question 1 .2 out of 2 points
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.Answer
Correct Answer:
Phishing
. Question 2 .2 out of 2 points
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.Answer
Correct Answer:
duplicate
. Question 3 .2 out of 2 points
A computer programmed to act like an IP telephone is known as a(n) ____.Answer
Correct Answer:
softphone
. Question 4 .2 out of 2 points
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.Answer
Correct Answer:
POP3
. Question 5 .2 out of 2 points
____ software searches a node for open ports.Answer
Correct Answer:
Port scanner
. Question 6 .0 out of 2 points
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.Answer
Correct Answer:
call signaling and control
. Question 7 .0 out of 2 points
All VoIP calls are carried over the Internet.Answer
Correct Answer: False
. Question 8 .2 out of 2 points
____ describes the use of any network to carry voice signals using the TCP/IP protocol.Answer
Correct Answer:
IP telephony
. Question 9 .0 out of 2 points
____ is a method of encrypting TCP/IP transmissions.Answer
Correct Answer:
SSL
. Question 10 .0 out of 2 points
The combination of a public key and a private key is known as a ____.Answer
Correct Answer:
key pair
. Question 11 .2 out of 2 points
A patch is a replacement for an entire software package.Answer
Correct Answer: False
. Question 12 .2 out of 2 points
____ is the use of one network to simultaneously carry voice, video, and data communications.Answer
Correct Answer:
Convergence
. Question 13 .2 out of 2 points
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.Answer
Correct Answer:
router’s
. Question 14 .0 out of 2 points
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.Answer
Correct Answer:
backleveling
. Question 15 .2 out of 2 points
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.Answer
Correct Answer:
supported services list
. Question 16 .2 out of 2 points
Network security is more often compromised “from the inside” than from external sources.Answer
Correct Answer: True
. Question 17 .2 out of 2 points
A ____ is a program that runs automatically, without requiring a person to start or stop it.Answer
Correct Answer:
bot
. Question 18 .2 out of 2 points
Some software errors point to a physical connectivity problem.Answer
Correct Answer: True
. Question 19 .0 out of 2 points
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.Answer
Correct Answer:
dictionary
. Question 20 .2 out of 2 points
____ management refers to the detection and signaling of device, link, or component faults.Answer
Correct Answer:
Fault
. Question 21 .2 out of 2 points
A(n) ____ virus changes its characteristics every time it is transferred to a new system.Answer
Correct Answer:
polymorphic
. Question 22 .0 out of 2 points
Above all, keep ____ in mind when you upgrade or install hardware on a network.Answer
Correct Answer:
safety
. Question 23 .2 out of 2 points
Protection against harmful code involves more than just installing anti-malware software.Answer
Correct Answer: True
. Question 24 .2 out of 2 points
____ are programs that run independently and travel between computers and across networks.Answer
Correct Answer:
Worms
. Question 25 .2 out of 2 points
SMTP operates from port ____.Answer
Correct Answer:
25
. Question 26 .2 out of 2 points
The support and use of multiple processors to handle multiple threads is known as ____.Answer
Correct Answer:
multiprocessing
. Question 27 .2 out of 2 points
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.Answer
Correct Answer:
packet
. Question 28 .0 out of 2 points
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.Answer
Correct Answer:
1
. Question 29 .2 out of 2 points
The directory containing information about objects in a domain resides on computers called ____ controllers.Answer
Correct Answer:
domain
. Question 30 .2 out of 2 points
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.Answer
Correct Answer:
PGP
. Question 31 .2 out of 2 points
A ____ is a network device devoted to storage and delivery of frequently requested files.Answer
Correct Answer:
cache engine
. Question 32 .2 out of 2 points
The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.Answer
Correct Answer:
kernel
. Question 33 .2 out of 2 points
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.Answer
Correct Answer:
digital certificate
. Question 34 .0 out of 2 points
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.Answer
Correct Answer:
brute force
. Question 35 .2 out of 2 points
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.Answer
Correct Answer:
packet-filtering
. Question 36 .0 out of 2 points
In classful addressing, Class C IPv4 address host information is located in the ____.Answer
Correct Answer:
last 8 bits
. Question 37 .2 out of 2 points
____is the local storage of frequently needed files that would otherwise be obtained from an external source.Answer
Correct Answer:
Caching
. Question 38 .2 out of 2 points
____ is a fundamental property of wire that depends on a wire’s molecular structure and size.Answer
Correct Answer:
Resistance
. Question 39 .2 out of 2 points
____ protocols are the rules that computers follow to accomplish authentication.Answer
Correct Answer:
Authentication
. Question 40 .2 out of 2 points
An off-the-shelf workstation can be programmed to act like an IP telephone.Answer
Correct Answer: True
. Question 41 .2 out of 2 points
A ____ is a correction, improvement, or enhancement to a particular piece of a software application.Answer
Correct Answer:
patch
. Question 42 .2 out of 2 points
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.Answer
Correct Answer:
GUI
. Question 43 .2 out of 2 points
IP telephones are directly connected to the local loop.Answer
Correct Answer: False
. Question 44 .2 out of 2 points
A(n) ____ virus disguises itself as a legitimate program to prevent detection.Answer
Correct Answer:
stealth
. Question 45 .0 out of 2 points
In ____, parity error checking occurs when data is written across the disk array.Answer
Correct Answer:
RAID Level 3
. Question 46 .2 out of 2 points
The process of copying directory data to multiple domain controllers is known as ____.Answer
Correct Answer:
replication
. Question 47 .2 out of 2 points
When using classful IPv4 addressing, a network ID always ends with an octet of ____.Answer
Correct Answer:
0
. Question 48 .2 out of 2 points
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.Answer
Correct Answer:
promiscuous
. Question 49 .2 out of 2 points
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.Answer
Correct Answer:
default
. Question 50 .2 out of 2 points
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.Answer
Correct Answer:
110
. Question 51 .2 out of 2 points
A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.Answer
Correct Answer:
server
. Question 52 .2 out of 2 points
Resistance is measured in ____.Answer
Correct Answer:
ohms
. Question 53 .2 out of 2 points
A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.Answer
Correct Answer:
software routine
. Question 54 .2 out of 2 points
A program that disguises itself as something useful but actually harms your system is called a ____.Answer
Correct Answer:
Trojan horse
. Question 55 .2 out of 2 points
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.Answer
Correct Answer:
polling
. Question 56 .2 out of 2 points
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.Answer
Correct Answer:
Optical media
. Question 57 .2 out of 2 points
A key component in managing networks is identifying and tracking its hardware and software through ____ management.Answer
Correct Answer:
asset
. Question 58 .2 out of 2 points
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.Answer
Correct Answer:
voltage
. Question 59 .0 out of 2 points
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.Answer
Correct Answer:
NAS
. Question 60 .2 out of 2 points
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.Answer
Correct Answer:
man
. Question 61 .2 out of 2 points
A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.Answer
Correct Answer:
pathping
. Question 62 .2 out of 2 points
____ is a measure of how well a network service matches its expected performance.Answer
Correct Answer:
QoS
. Question 63 .2 out of 2 points
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.Answer
Correct Answer:
online
. Question 64 .0 out of 2 points
____ are often considered third-level support.Answer
Correct Answer:
Help desk coordinators
. Question 65 .2 out of 2 points
In ____ addressing, only Class A, Class B, and Class C addresses are recognized.Answer
Correct Answer:
classful
. Question 66 .0 out of 2 points
Among all video-over-IP applications, ____ is perhaps the simplest.Answer
Correct Answer:
streaming video
. Question 67 .2 out of 2 points
An example of a popular mail server is ____.Answer
Correct Answer:
Microsoft Exchange Server
. Question 68 .0 out of 2 points
IMAP4 servers require less storage space and usually more processing resources than POP servers do.Answer
Correct Answer: False
. Question 69 .2 out of 2 points
In CIDR, conventional network class distinctions do not exist.Answer
Correct Answer: True
. Question 70 .2 out of 2 points
The most comprehensive and complex upgrade involving network hardware is a(n) ____ upgrade.Answer
Correct Answer:
backbone
. Question 71 .0 out of 2 points
A(n) ____ is a graphical representation of a network’s devices and connections.Answer
Correct Answer:
network diagram
. Question 72 .2 out of 2 points
The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.Answer
Correct Answer: False
. Question 73 .2 out of 2 points
____ are often considered first-level support.Answer
Correct Answer:
Help desk analysts
. Question 74 .0 out of 2 points
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.Answer
Correct Answer:
video over IP
. Question 75 .0 out of 2 points
____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.Answer
Correct Answer:
Configuration
. Question 76 .2 out of 2 points
The use of certificate authorities to associate public keys with certain users is known as ____.Answer
Correct Answer:
PKI
. Question 77 .2 out of 2 points
A(n) ____ is a list that organizes resources and associates them with their characteristics.Answer
Correct Answer:
directory
. Question 78 .2 out of 2 points
Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.Answer
Correct Answer:
justify
. Question 79 .2 out of 2 points
A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.Answer
Correct Answer: False
. Question 80 .2 out of 2 points
In a ____ attack, a person redirects or captures secure transmissions as they occur.Answer
Correct Answer:
man-in-the-middle
. Question 81 .2 out of 2 points
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.Answer
Correct Answer:
Traffic shaping
. Question 82 .2 out of 2 points
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.Answer
Correct Answer:
toll bypass
. Question 83 .2 out of 2 points
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.Answer
Correct Answer: True
. Question 84 .2 out of 2 points
____ is one of the most important functions an NOS provides.Answer
Correct Answer:
Client support
. Question 85 .2 out of 2 points
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.Answer
Correct Answer:
concentrator
. Question 86 .2 out of 2 points
Tone generators and tone locators are used to determine characteristics about a cable.Answer
Correct Answer: False
. Question 87 .0 out of 2 points
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.Answer
Correct Answer:
1000
. Question 88 .2 out of 2 points
UNIX was one of the first operating systems to implement a ____ file system.Answer
Correct Answer:
hierarchical
. Question 89 .2 out of 2 points
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.Answer
Correct Answer:
IP-PBX
. Question 90 .2 out of 2 points
Active Directory organizes multiple domains hierarchically in a domain ____.Answer
Correct Answer:
tree
. Question 91 .2 out of 2 points
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.Answer
Correct Answer:
network monitor
. Question 92 .2 out of 2 points
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.Answer
Correct Answer:
forward slash ( / )
. Question 93 .2 out of 2 points
____ messaging is a service that makes several forms of communication available from a single user interface.Answer
Correct Answer:
Unified
. Question 94 .2 out of 2 points
____ signaling functions are more limited than those performed by the protocols in the H.323 group.Answer
Correct Answer:
SIP
. Question 95 .0 out of 2 points
A(n) ____ is a deviation from a specified level of system performance for a given period of time.Answer
Correct Answer:
failure
. Question 96 .0 out of 2 points
The core of all UNIX and Linux systems is called the kernel.Answer
Correct Answer: True
. Question 97 .2 out of 2 points
Solaris employs the file system called ____ for its native file system type.Answer
Correct Answer:
UFS
. Question 98 .2 out of 2 points
Most wireless testing tools contain more powerful antennas than a workstation NIC.Answer
Correct Answer: True
. Question 99 .2 out of 2 points
SIP and H.323 account for communication between media gateways.Answer
Correct Answer: False
. Question 100 .0 out of 2 points
By default, the 802.11 standard offers substantial security.Answer
Correct Answer: False
. Question 101 .2 out of 2 points
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.Answer
Correct Answer:
reserved
. Question 102 .2 out of 2 points
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.Answer
Correct Answer:
Ghosts
. Question 103 .0 out of 2 points
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.Answer
Correct Answer:
transmission and hardware
. Question 104 .0 out of 2 points
An administrator can discover the host name assigned to a client by using the ____ utility.Answer
Correct Answer:
hostname
. Question 105 .0 out of 2 points
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.Answer
Correct Answer:
bridge
. Question 106 .2 out of 2 points
____ is intended to eliminate single points of failure.Answer
Correct Answer:
Redundancy
. Question 107 .0 out of 2 points
____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.Answer
Correct Answer:
Application
. Question 108 .2 out of 2 points
A(n) ____ is a computer that manages multiple media gateways.Answer
Correct Answer:
MGC
. Question 109 .2 out of 2 points
____ is the telltale factor for ascertaining where faults in a cable lie.Answer
Correct Answer:
Impedance
. Question 110 .2 out of 2 points
The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.Answer
Correct Answer:
physical
. Question 111 .2 out of 2 points
Encryption is the last means of defense against data theft.Answer
Correct Answer: True
. Question 112 .2 out of 2 points
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.Answer
Correct Answer:
SONET rings
. Question 113 .2 out of 2 points
A ____ usually results from a bad NIC.Answer
Correct Answer:
jabber
. Question 114 .2 out of 2 points
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.Answer
Correct Answer:
crossover
. Question 115 .0 out of 2 points
For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.Answer
Correct Answer: False
. Question 116 .2 out of 2 points
A(n) ____ is a self-contained, well-defined task within a process.Answer
Correct Answer:
thread
. Question 117 .2 out of 2 points
Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.Answer
Correct Answer: True
. Question 118 .2 out of 2 points
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.Answer
Correct Answer:
denial-of-service
. Question 119 .2 out of 2 points
____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.Answer
Correct Answer:
UDP
. Question 120 .0 out of 2 points
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.Answer
Correct Answer:
Heuristic
. Question 121 .2 out of 2 points
A ____ can be used to intercept a telephone conversation.Answer
Correct Answer:
butt set
. Question 122 .0 out of 2 points
A____ is a small electronic device that issues a signal on a wire pair.Answer
Correct Answer:
tone generator
. Question 123 .0 out of 2 points
The ____ utility allows you to view a host’s routing table.Answer
Correct Answer:
route
. Question 124 .0 out of 2 points
The result from ANDing 11001111 with 10010001 is ____.Answer
Correct Answer:
10000001
. Question 125 .2 out of 2 points
In ____, both computers verify the credentials of the other.Answer
Correct Answer:
mutual authentication
. Question 126 .0 out of 2 points
Power that is free from noise is called “____” power.Answer
Correct Answer:
clean
. Question 127 .2 out of 2 points
Continuity testers can test only copper cable.Answer
Correct Answer: False
. Question 128 .2 out of 2 points
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.Answer
Correct Answer:
Integrity checking
. Question 129 .2 out of 2 points
Within a classful addressing, ____ is the default subnet mask for a Class C address.Answer
Correct Answer:
255.255.255.0
. Question 130 .0 out of 2 points
In classful addressing, the Class B IPv4 address network ID is located in the ____.Answer
Correct Answer:
first 16 bits
. Question 131 .0 out of 2 points
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.Answer
Correct Answer:
unicast
. Question 132 .0 out of 2 points
A ____ is a major change to a software package’s existing code.Answer
Correct Answer:
software upgrade
. Question 133 .0 out of 2 points
A networked ____ is perhaps the simplest device to add.Answer
Correct Answer:
workstation
. Question 134 .2 out of 2 points
On a network using TCP/IP, some nodes may use multiple IP addresses.Answer
Correct Answer: True
. Question 135 .2 out of 2 points
____ provides redundancy through a process called disk mirroring.Answer
Correct Answer:
RAID Level 1
. Question 136 .2 out of 2 points
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.Answer
Correct Answer:
LDAP
. Question 137 .2 out of 2 points
The gateways that make up the Internet backbone are called ____ gateways.Answer
Correct Answer:
core
. Question 138 .2 out of 2 points
An example of a popular client email software is ____.Answer
Correct Answer:
Microsoft Outlook
. Question 139 .2 out of 2 points
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.Answer
Correct Answer: True
. Question 140 .2 out of 2 points
Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.Answer
Correct Answer:
traffic
. Question 141 .2 out of 2 points
It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.Answer
Correct Answer: True
. Question 142 .0 out of 2 points
The goal of fault-tolerant systems is to prevent failures from progressing to faults.Answer
Correct Answer: False
. Question 143 .2 out of 2 points
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.Answer
Correct Answer: False
. Question 144 .2 out of 2 points
A(n) ____ is a graphical representation of a network’s wired infrastructure.Answer
Correct Answer:
wiring schematic
. Question 145 .2 out of 2 points
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.Answer
Correct Answer:
Performance
. Question 146 .2 out of 2 points
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer
Correct Answer:
Signature
. Question 147 .2 out of 2 points
Many network engineers consider ____ to be superior to MGCP.Answer
Correct Answer:
MEGACO
. Question 148 .2 out of 2 points
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.Answer
Correct Answer:
bit
. Question 149 .2 out of 2 points
RADIUS and TACACS belong to a category of protocols known as AAA (____).Answer
Correct Answer:
authentication, authorization, and accounting
. Question 150 .2 out of 2 points
POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.Answer
Correct Answer: True
.Wednesday, February 2, 2011 7:27:39 PM CST
OK
.