Current Location Network+ ITNW1458.20101122.257400 Quizzes & Exams Review Test Submission: Final Exam . Menu Management Options Expand AllCollapse All ..Course Menu:Network+ (ITNW1458.20101122.257400) Announcements .Instructor .Messaging -------------------------------------------------------------------------------- .Syllabus .Lessons .Web Based Labs .Presentations .Book Ch 1-6 .Quizzes & Exams .Discussion Board -------------------------------------------------------------------------------- .Tools .Communications .Plagarism .Non Course Links .Evaluation .Review Test Submission: Final Exam.ContentUser Lucas Schwartz Submitted 2/2/11 7:27 PM Name Final Exam Status Completed Score 226 out of 300 points Time Elapsed 57 minutes, and 55 seconds out of 2 hours. Instructions Question 1 .2 out of 2 points ____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.Answer Correct Answer: Phishing . Question 2 .2 out of 2 points A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.Answer Correct Answer: duplicate . Question 3 .2 out of 2 points A computer programmed to act like an IP telephone is known as a(n) ____.Answer Correct Answer: softphone . Question 4 .2 out of 2 points IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.Answer Correct Answer: POP3 . Question 5 .2 out of 2 points ____ software searches a node for open ports.Answer Correct Answer: Port scanner . Question 6 .0 out of 2 points SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.Answer Correct Answer: call signaling and control . Question 7 .0 out of 2 points All VoIP calls are carried over the Internet.Answer Correct Answer: False . Question 8 .2 out of 2 points ____ describes the use of any network to carry voice signals using the TCP/IP protocol.Answer Correct Answer: IP telephony . Question 9 .0 out of 2 points ____ is a method of encrypting TCP/IP transmissions.Answer Correct Answer: SSL . Question 10 .0 out of 2 points The combination of a public key and a private key is known as a ____.Answer Correct Answer: key pair . Question 11 .2 out of 2 points A patch is a replacement for an entire software package.Answer Correct Answer: False . Question 12 .2 out of 2 points ____ is the use of one network to simultaneously carry voice, video, and data communications.Answer Correct Answer: Convergence . Question 13 .2 out of 2 points A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.Answer Correct Answer: router’s . Question 14 .0 out of 2 points The process of reverting to a previous version of software after attempting to upgrade it is known as ____.Answer Correct Answer: backleveling . Question 15 .2 out of 2 points A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.Answer Correct Answer: supported services list . Question 16 .2 out of 2 points Network security is more often compromised “from the inside” than from external sources.Answer Correct Answer: True . Question 17 .2 out of 2 points A ____ is a program that runs automatically, without requiring a person to start or stop it.Answer Correct Answer: bot . Question 18 .2 out of 2 points Some software errors point to a physical connectivity problem.Answer Correct Answer: True . Question 19 .0 out of 2 points A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.Answer Correct Answer: dictionary . Question 20 .2 out of 2 points ____ management refers to the detection and signaling of device, link, or component faults.Answer Correct Answer: Fault . Question 21 .2 out of 2 points A(n) ____ virus changes its characteristics every time it is transferred to a new system.Answer Correct Answer: polymorphic . Question 22 .0 out of 2 points Above all, keep ____ in mind when you upgrade or install hardware on a network.Answer Correct Answer: safety . Question 23 .2 out of 2 points Protection against harmful code involves more than just installing anti-malware software.Answer Correct Answer: True . Question 24 .2 out of 2 points ____ are programs that run independently and travel between computers and across networks.Answer Correct Answer: Worms . Question 25 .2 out of 2 points SMTP operates from port ____.Answer Correct Answer: 25 . Question 26 .2 out of 2 points The support and use of multiple processors to handle multiple threads is known as ____.Answer Correct Answer: multiprocessing . Question 27 .2 out of 2 points When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.Answer Correct Answer: packet . Question 28 .0 out of 2 points Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.Answer Correct Answer: 1 . Question 29 .2 out of 2 points The directory containing information about objects in a domain resides on computers called ____ controllers.Answer Correct Answer: domain . Question 30 .2 out of 2 points ____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.Answer Correct Answer: PGP . Question 31 .2 out of 2 points A ____ is a network device devoted to storage and delivery of frequently requested files.Answer Correct Answer: cache engine . Question 32 .2 out of 2 points The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.Answer Correct Answer: kernel . Question 33 .2 out of 2 points A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.Answer Correct Answer: digital certificate . Question 34 .0 out of 2 points A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.Answer Correct Answer: brute force . Question 35 .2 out of 2 points A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.Answer Correct Answer: packet-filtering . Question 36 .0 out of 2 points In classful addressing, Class C IPv4 address host information is located in the ____.Answer Correct Answer: last 8 bits . Question 37 .2 out of 2 points ____is the local storage of frequently needed files that would otherwise be obtained from an external source.Answer Correct Answer: Caching . Question 38 .2 out of 2 points ____ is a fundamental property of wire that depends on a wire’s molecular structure and size.Answer Correct Answer: Resistance . Question 39 .2 out of 2 points ____ protocols are the rules that computers follow to accomplish authentication.Answer Correct Answer: Authentication . Question 40 .2 out of 2 points An off-the-shelf workstation can be programmed to act like an IP telephone.Answer Correct Answer: True . Question 41 .2 out of 2 points A ____ is a correction, improvement, or enhancement to a particular piece of a software application.Answer Correct Answer: patch . Question 42 .2 out of 2 points A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.Answer Correct Answer: GUI . Question 43 .2 out of 2 points IP telephones are directly connected to the local loop.Answer Correct Answer: False . Question 44 .2 out of 2 points A(n) ____ virus disguises itself as a legitimate program to prevent detection.Answer Correct Answer: stealth . Question 45 .0 out of 2 points In ____, parity error checking occurs when data is written across the disk array.Answer Correct Answer: RAID Level 3 . Question 46 .2 out of 2 points The process of copying directory data to multiple domain controllers is known as ____.Answer Correct Answer: replication . Question 47 .2 out of 2 points When using classful IPv4 addressing, a network ID always ends with an octet of ____.Answer Correct Answer: 0 . Question 48 .2 out of 2 points To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.Answer Correct Answer: promiscuous . Question 49 .2 out of 2 points The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.Answer Correct Answer: default . Question 50 .2 out of 2 points POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.Answer Correct Answer: 110 . Question 51 .2 out of 2 points A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.Answer Correct Answer: server . Question 52 .2 out of 2 points Resistance is measured in ____.Answer Correct Answer: ohms . Question 53 .2 out of 2 points A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.Answer Correct Answer: software routine . Question 54 .2 out of 2 points A program that disguises itself as something useful but actually harms your system is called a ____.Answer Correct Answer: Trojan horse . Question 55 .2 out of 2 points The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.Answer Correct Answer: polling . Question 56 .2 out of 2 points ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.Answer Correct Answer: Optical media . Question 57 .2 out of 2 points A key component in managing networks is identifying and tracking its hardware and software through ____ management.Answer Correct Answer: asset . Question 58 .2 out of 2 points When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.Answer Correct Answer: voltage . Question 59 .0 out of 2 points ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.Answer Correct Answer: NAS . Question 60 .2 out of 2 points Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.Answer Correct Answer: man . Question 61 .2 out of 2 points A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.Answer Correct Answer: pathping . Question 62 .2 out of 2 points ____ is a measure of how well a network service matches its expected performance.Answer Correct Answer: QoS . Question 63 .2 out of 2 points A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.Answer Correct Answer: online . Question 64 .0 out of 2 points ____ are often considered third-level support.Answer Correct Answer: Help desk coordinators . Question 65 .2 out of 2 points In ____ addressing, only Class A, Class B, and Class C addresses are recognized.Answer Correct Answer: classful . Question 66 .0 out of 2 points Among all video-over-IP applications, ____ is perhaps the simplest.Answer Correct Answer: streaming video . Question 67 .2 out of 2 points An example of a popular mail server is ____.Answer Correct Answer: Microsoft Exchange Server . Question 68 .0 out of 2 points IMAP4 servers require less storage space and usually more processing resources than POP servers do.Answer Correct Answer: False . Question 69 .2 out of 2 points In CIDR, conventional network class distinctions do not exist.Answer Correct Answer: True . Question 70 .2 out of 2 points The most comprehensive and complex upgrade involving network hardware is a(n) ____ upgrade.Answer Correct Answer: backbone . Question 71 .0 out of 2 points A(n) ____ is a graphical representation of a network’s devices and connections.Answer Correct Answer: network diagram . Question 72 .2 out of 2 points The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.Answer Correct Answer: False . Question 73 .2 out of 2 points ____ are often considered first-level support.Answer Correct Answer: Help desk analysts . Question 74 .0 out of 2 points IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.Answer Correct Answer: video over IP . Question 75 .0 out of 2 points ____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.Answer Correct Answer: Configuration . Question 76 .2 out of 2 points The use of certificate authorities to associate public keys with certain users is known as ____.Answer Correct Answer: PKI . Question 77 .2 out of 2 points A(n) ____ is a list that organizes resources and associates them with their characteristics.Answer Correct Answer: directory . Question 78 .2 out of 2 points Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.Answer Correct Answer: justify . Question 79 .2 out of 2 points A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.Answer Correct Answer: False . Question 80 .2 out of 2 points In a ____ attack, a person redirects or captures secure transmissions as they occur.Answer Correct Answer: man-in-the-middle . Question 81 .2 out of 2 points ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.Answer Correct Answer: Traffic shaping . Question 82 .2 out of 2 points Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.Answer Correct Answer: toll bypass . Question 83 .2 out of 2 points Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.Answer Correct Answer: True . Question 84 .2 out of 2 points ____ is one of the most important functions an NOS provides.Answer Correct Answer: Client support . Question 85 .2 out of 2 points A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.Answer Correct Answer: concentrator . Question 86 .2 out of 2 points Tone generators and tone locators are used to determine characteristics about a cable.Answer Correct Answer: False . Question 87 .0 out of 2 points The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.Answer Correct Answer: 1000 . Question 88 .2 out of 2 points UNIX was one of the first operating systems to implement a ____ file system.Answer Correct Answer: hierarchical . Question 89 .2 out of 2 points In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.Answer Correct Answer: IP-PBX . Question 90 .2 out of 2 points Active Directory organizes multiple domains hierarchically in a domain ____.Answer Correct Answer: tree . Question 91 .2 out of 2 points A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.Answer Correct Answer: network monitor . Question 92 .2 out of 2 points CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.Answer Correct Answer: forward slash ( / ) . Question 93 .2 out of 2 points ____ messaging is a service that makes several forms of communication available from a single user interface.Answer Correct Answer: Unified . Question 94 .2 out of 2 points ____ signaling functions are more limited than those performed by the protocols in the H.323 group.Answer Correct Answer: SIP . Question 95 .0 out of 2 points A(n) ____ is a deviation from a specified level of system performance for a given period of time.Answer Correct Answer: failure . Question 96 .0 out of 2 points The core of all UNIX and Linux systems is called the kernel.Answer Correct Answer: True . Question 97 .2 out of 2 points Solaris employs the file system called ____ for its native file system type.Answer Correct Answer: UFS . Question 98 .2 out of 2 points Most wireless testing tools contain more powerful antennas than a workstation NIC.Answer Correct Answer: True . Question 99 .2 out of 2 points SIP and H.323 account for communication between media gateways.Answer Correct Answer: False . Question 100 .0 out of 2 points By default, the 802.11 standard offers substantial security.Answer Correct Answer: False . Question 101 .2 out of 2 points Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.Answer Correct Answer: reserved . Question 102 .2 out of 2 points ____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.Answer Correct Answer: Ghosts . Question 103 .0 out of 2 points A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.Answer Correct Answer: transmission and hardware . Question 104 .0 out of 2 points An administrator can discover the host name assigned to a client by using the ____ utility.Answer Correct Answer: hostname . Question 105 .0 out of 2 points When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.Answer Correct Answer: bridge . Question 106 .2 out of 2 points ____ is intended to eliminate single points of failure.Answer Correct Answer: Redundancy . Question 107 .0 out of 2 points ____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.Answer Correct Answer: Application . Question 108 .2 out of 2 points A(n) ____ is a computer that manages multiple media gateways.Answer Correct Answer: MGC . Question 109 .2 out of 2 points ____ is the telltale factor for ascertaining where faults in a cable lie.Answer Correct Answer: Impedance . Question 110 .2 out of 2 points The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.Answer Correct Answer: physical . Question 111 .2 out of 2 points Encryption is the last means of defense against data theft.Answer Correct Answer: True . Question 112 .2 out of 2 points Mesh topologies and ____ topologies are good choices for highly available enterprise networks.Answer Correct Answer: SONET rings . Question 113 .2 out of 2 points A ____ usually results from a bad NIC.Answer Correct Answer: jabber . Question 114 .2 out of 2 points In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.Answer Correct Answer: crossover . Question 115 .0 out of 2 points For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.Answer Correct Answer: False . Question 116 .2 out of 2 points A(n) ____ is a self-contained, well-defined task within a process.Answer Correct Answer: thread . Question 117 .2 out of 2 points Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.Answer Correct Answer: True . Question 118 .2 out of 2 points A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.Answer Correct Answer: denial-of-service . Question 119 .2 out of 2 points ____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.Answer Correct Answer: UDP . Question 120 .0 out of 2 points ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.Answer Correct Answer: Heuristic . Question 121 .2 out of 2 points A ____ can be used to intercept a telephone conversation.Answer Correct Answer: butt set . Question 122 .0 out of 2 points A____ is a small electronic device that issues a signal on a wire pair.Answer Correct Answer: tone generator . Question 123 .0 out of 2 points The ____ utility allows you to view a host’s routing table.Answer Correct Answer: route . Question 124 .0 out of 2 points The result from ANDing 11001111 with 10010001 is ____.Answer Correct Answer: 10000001 . Question 125 .2 out of 2 points In ____, both computers verify the credentials of the other.Answer Correct Answer: mutual authentication . Question 126 .0 out of 2 points Power that is free from noise is called “____” power.Answer Correct Answer: clean . Question 127 .2 out of 2 points Continuity testers can test only copper cable.Answer Correct Answer: False . Question 128 .2 out of 2 points ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.Answer Correct Answer: Integrity checking . Question 129 .2 out of 2 points Within a classful addressing, ____ is the default subnet mask for a Class C address.Answer Correct Answer: 255.255.255.0 . Question 130 .0 out of 2 points In classful addressing, the Class B IPv4 address network ID is located in the ____.Answer Correct Answer: first 16 bits . Question 131 .0 out of 2 points Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.Answer Correct Answer: unicast . Question 132 .0 out of 2 points A ____ is a major change to a software package’s existing code.Answer Correct Answer: software upgrade . Question 133 .0 out of 2 points A networked ____ is perhaps the simplest device to add.Answer Correct Answer: workstation . Question 134 .2 out of 2 points On a network using TCP/IP, some nodes may use multiple IP addresses.Answer Correct Answer: True . Question 135 .2 out of 2 points ____ provides redundancy through a process called disk mirroring.Answer Correct Answer: RAID Level 1 . Question 136 .2 out of 2 points Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.Answer Correct Answer: LDAP . Question 137 .2 out of 2 points The gateways that make up the Internet backbone are called ____ gateways.Answer Correct Answer: core . Question 138 .2 out of 2 points An example of a popular client email software is ____.Answer Correct Answer: Microsoft Outlook . Question 139 .2 out of 2 points Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.Answer Correct Answer: True . Question 140 .2 out of 2 points Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.Answer Correct Answer: traffic . Question 141 .2 out of 2 points It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.Answer Correct Answer: True . Question 142 .0 out of 2 points The goal of fault-tolerant systems is to prevent failures from progressing to faults.Answer Correct Answer: False . Question 143 .2 out of 2 points A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.Answer Correct Answer: False . Question 144 .2 out of 2 points A(n) ____ is a graphical representation of a network’s wired infrastructure.Answer Correct Answer: wiring schematic . Question 145 .2 out of 2 points ____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.Answer Correct Answer: Performance . Question 146 .2 out of 2 points ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer Correct Answer: Signature . Question 147 .2 out of 2 points Many network engineers consider ____ to be superior to MGCP.Answer Correct Answer: MEGACO . Question 148 .2 out of 2 points An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.Answer Correct Answer: bit . Question 149 .2 out of 2 points RADIUS and TACACS belong to a category of protocols known as AAA (____).Answer Correct Answer: authentication, authorization, and accounting . Question 150 .2 out of 2 points POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.Answer Correct Answer: True .Wednesday, February 2, 2011 7:27:39 PM CST OK .