Advertisement
Guest User

Untitled

a guest
Feb 2nd, 2011
10,418
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.82 KB | None | 0 0
  1. Current Location Network+ ITNW1458.20101122.257400 Quizzes & Exams Review Test Submission: Final Exam
  2. .
  3.  
  4.  
  5. Menu Management Options
  6.  
  7.  
  8. Expand AllCollapse All
  9.  
  10. ..Course Menu:Network+ (ITNW1458.20101122.257400)
  11.  
  12. Announcements .Instructor .Messaging
  13. --------------------------------------------------------------------------------
  14. .Syllabus .Lessons .Web Based Labs .Presentations .Book Ch 1-6 .Quizzes & Exams .Discussion Board
  15. --------------------------------------------------------------------------------
  16. .Tools .Communications .Plagarism .Non Course Links .Evaluation .Review Test Submission: Final Exam.ContentUser Lucas Schwartz
  17. Submitted 2/2/11 7:27 PM
  18. Name Final Exam
  19. Status Completed
  20. Score 226 out of 300 points
  21. Time Elapsed 57 minutes, and 55 seconds out of 2 hours.
  22. Instructions
  23.  
  24. Question 1 .2 out of 2 points
  25.  
  26. ____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.Answer
  27. Correct Answer:
  28. Phishing
  29.  
  30. . Question 2 .2 out of 2 points
  31.  
  32. A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.Answer
  33. Correct Answer:
  34. duplicate
  35.  
  36. . Question 3 .2 out of 2 points
  37.  
  38. A computer programmed to act like an IP telephone is known as a(n) ____.Answer
  39. Correct Answer:
  40. softphone
  41.  
  42. . Question 4 .2 out of 2 points
  43.  
  44. IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.Answer
  45. Correct Answer:
  46. POP3
  47.  
  48. . Question 5 .2 out of 2 points
  49.  
  50. ____ software searches a node for open ports.Answer
  51. Correct Answer:
  52. Port scanner
  53.  
  54. . Question 6 .0 out of 2 points
  55.  
  56. SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.Answer
  57. Correct Answer:
  58. call signaling and control
  59.  
  60. . Question 7 .0 out of 2 points
  61.  
  62. All VoIP calls are carried over the Internet.Answer
  63.  
  64. Correct Answer: False
  65.  
  66. . Question 8 .2 out of 2 points
  67.  
  68. ____ describes the use of any network to carry voice signals using the TCP/IP protocol.Answer
  69. Correct Answer:
  70. IP telephony
  71.  
  72. . Question 9 .0 out of 2 points
  73.  
  74. ____ is a method of encrypting TCP/IP transmissions.Answer
  75. Correct Answer:
  76. SSL
  77.  
  78. . Question 10 .0 out of 2 points
  79.  
  80. The combination of a public key and a private key is known as a ____.Answer
  81. Correct Answer:
  82. key pair
  83.  
  84. . Question 11 .2 out of 2 points
  85.  
  86. A patch is a replacement for an entire software package.Answer
  87.  
  88. Correct Answer: False
  89.  
  90. . Question 12 .2 out of 2 points
  91.  
  92. ____ is the use of one network to simultaneously carry voice, video, and data communications.Answer
  93. Correct Answer:
  94. Convergence
  95.  
  96. . Question 13 .2 out of 2 points
  97.  
  98. A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.Answer
  99. Correct Answer:
  100. router’s
  101.  
  102. . Question 14 .0 out of 2 points
  103.  
  104. The process of reverting to a previous version of software after attempting to upgrade it is known as ____.Answer
  105. Correct Answer:
  106. backleveling
  107.  
  108. . Question 15 .2 out of 2 points
  109.  
  110. A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.Answer
  111. Correct Answer:
  112. supported services list
  113.  
  114. . Question 16 .2 out of 2 points
  115.  
  116. Network security is more often compromised “from the inside” than from external sources.Answer
  117.  
  118. Correct Answer: True
  119.  
  120. . Question 17 .2 out of 2 points
  121.  
  122. A ____ is a program that runs automatically, without requiring a person to start or stop it.Answer
  123. Correct Answer:
  124. bot
  125.  
  126. . Question 18 .2 out of 2 points
  127.  
  128. Some software errors point to a physical connectivity problem.Answer
  129.  
  130. Correct Answer: True
  131.  
  132. . Question 19 .0 out of 2 points
  133.  
  134. A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.Answer
  135. Correct Answer:
  136. dictionary
  137.  
  138. . Question 20 .2 out of 2 points
  139.  
  140. ____ management refers to the detection and signaling of device, link, or component faults.Answer
  141. Correct Answer:
  142. Fault
  143.  
  144. . Question 21 .2 out of 2 points
  145.  
  146. A(n) ____ virus changes its characteristics every time it is transferred to a new system.Answer
  147. Correct Answer:
  148. polymorphic
  149.  
  150. . Question 22 .0 out of 2 points
  151.  
  152. Above all, keep ____ in mind when you upgrade or install hardware on a network.Answer
  153. Correct Answer:
  154. safety
  155.  
  156. . Question 23 .2 out of 2 points
  157.  
  158. Protection against harmful code involves more than just installing anti-malware software.Answer
  159.  
  160. Correct Answer: True
  161.  
  162. . Question 24 .2 out of 2 points
  163.  
  164. ____ are programs that run independently and travel between computers and across networks.Answer
  165. Correct Answer:
  166. Worms
  167.  
  168. . Question 25 .2 out of 2 points
  169.  
  170. SMTP operates from port ____.Answer
  171. Correct Answer:
  172. 25
  173.  
  174. . Question 26 .2 out of 2 points
  175.  
  176. The support and use of multiple processors to handle multiple threads is known as ____.Answer
  177. Correct Answer:
  178. multiprocessing
  179.  
  180. . Question 27 .2 out of 2 points
  181.  
  182. When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.Answer
  183. Correct Answer:
  184. packet
  185.  
  186. . Question 28 .0 out of 2 points
  187.  
  188. Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.Answer
  189. Correct Answer:
  190. 1
  191.  
  192. . Question 29 .2 out of 2 points
  193.  
  194. The directory containing information about objects in a domain resides on computers called ____ controllers.Answer
  195. Correct Answer:
  196. domain
  197.  
  198. . Question 30 .2 out of 2 points
  199.  
  200. ____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.Answer
  201. Correct Answer:
  202. PGP
  203.  
  204. . Question 31 .2 out of 2 points
  205.  
  206. A ____ is a network device devoted to storage and delivery of frequently requested files.Answer
  207. Correct Answer:
  208. cache engine
  209.  
  210. . Question 32 .2 out of 2 points
  211.  
  212. The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.Answer
  213. Correct Answer:
  214. kernel
  215.  
  216. . Question 33 .2 out of 2 points
  217.  
  218. A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.Answer
  219. Correct Answer:
  220. digital certificate
  221.  
  222. . Question 34 .0 out of 2 points
  223.  
  224. A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.Answer
  225. Correct Answer:
  226. brute force
  227.  
  228. . Question 35 .2 out of 2 points
  229.  
  230. A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.Answer
  231. Correct Answer:
  232. packet-filtering
  233.  
  234. . Question 36 .0 out of 2 points
  235.  
  236. In classful addressing, Class C IPv4 address host information is located in the ____.Answer
  237. Correct Answer:
  238. last 8 bits
  239.  
  240. . Question 37 .2 out of 2 points
  241.  
  242. ____is the local storage of frequently needed files that would otherwise be obtained from an external source.Answer
  243. Correct Answer:
  244. Caching
  245.  
  246. . Question 38 .2 out of 2 points
  247.  
  248. ____ is a fundamental property of wire that depends on a wire’s molecular structure and size.Answer
  249. Correct Answer:
  250. Resistance
  251.  
  252. . Question 39 .2 out of 2 points
  253.  
  254. ____ protocols are the rules that computers follow to accomplish authentication.Answer
  255. Correct Answer:
  256. Authentication
  257.  
  258. . Question 40 .2 out of 2 points
  259.  
  260. An off-the-shelf workstation can be programmed to act like an IP telephone.Answer
  261.  
  262. Correct Answer: True
  263.  
  264. . Question 41 .2 out of 2 points
  265.  
  266. A ____ is a correction, improvement, or enhancement to a particular piece of a software application.Answer
  267. Correct Answer:
  268. patch
  269.  
  270. . Question 42 .2 out of 2 points
  271.  
  272. A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.Answer
  273. Correct Answer:
  274. GUI
  275.  
  276. . Question 43 .2 out of 2 points
  277.  
  278. IP telephones are directly connected to the local loop.Answer
  279.  
  280. Correct Answer: False
  281.  
  282. . Question 44 .2 out of 2 points
  283.  
  284. A(n) ____ virus disguises itself as a legitimate program to prevent detection.Answer
  285. Correct Answer:
  286. stealth
  287.  
  288. . Question 45 .0 out of 2 points
  289.  
  290. In ____, parity error checking occurs when data is written across the disk array.Answer
  291. Correct Answer:
  292. RAID Level 3
  293.  
  294. . Question 46 .2 out of 2 points
  295.  
  296. The process of copying directory data to multiple domain controllers is known as ____.Answer
  297. Correct Answer:
  298. replication
  299.  
  300. . Question 47 .2 out of 2 points
  301.  
  302. When using classful IPv4 addressing, a network ID always ends with an octet of ____.Answer
  303. Correct Answer:
  304. 0
  305.  
  306. . Question 48 .2 out of 2 points
  307.  
  308. To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.Answer
  309. Correct Answer:
  310. promiscuous
  311.  
  312. . Question 49 .2 out of 2 points
  313.  
  314. The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.Answer
  315. Correct Answer:
  316. default
  317.  
  318. . Question 50 .2 out of 2 points
  319.  
  320. POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.Answer
  321. Correct Answer:
  322. 110
  323.  
  324. . Question 51 .2 out of 2 points
  325.  
  326. A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.Answer
  327. Correct Answer:
  328. server
  329.  
  330. . Question 52 .2 out of 2 points
  331.  
  332. Resistance is measured in ____.Answer
  333. Correct Answer:
  334. ohms
  335.  
  336. . Question 53 .2 out of 2 points
  337.  
  338. A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.Answer
  339. Correct Answer:
  340. software routine
  341.  
  342. . Question 54 .2 out of 2 points
  343.  
  344. A program that disguises itself as something useful but actually harms your system is called a ____.Answer
  345. Correct Answer:
  346. Trojan horse
  347.  
  348. . Question 55 .2 out of 2 points
  349.  
  350. The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.Answer
  351. Correct Answer:
  352. polling
  353.  
  354. . Question 56 .2 out of 2 points
  355.  
  356. ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.Answer
  357. Correct Answer:
  358. Optical media
  359.  
  360. . Question 57 .2 out of 2 points
  361.  
  362. A key component in managing networks is identifying and tracking its hardware and software through ____ management.Answer
  363. Correct Answer:
  364. asset
  365.  
  366. . Question 58 .2 out of 2 points
  367.  
  368. When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.Answer
  369. Correct Answer:
  370. voltage
  371.  
  372. . Question 59 .0 out of 2 points
  373.  
  374. ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.Answer
  375. Correct Answer:
  376. NAS
  377.  
  378. . Question 60 .2 out of 2 points
  379.  
  380. Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.Answer
  381. Correct Answer:
  382. man
  383.  
  384. . Question 61 .2 out of 2 points
  385.  
  386. A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.Answer
  387. Correct Answer:
  388. pathping
  389.  
  390. . Question 62 .2 out of 2 points
  391.  
  392. ____ is a measure of how well a network service matches its expected performance.Answer
  393. Correct Answer:
  394. QoS
  395.  
  396. . Question 63 .2 out of 2 points
  397.  
  398. A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.Answer
  399. Correct Answer:
  400. online
  401.  
  402. . Question 64 .0 out of 2 points
  403.  
  404. ____ are often considered third-level support.Answer
  405. Correct Answer:
  406. Help desk coordinators
  407.  
  408. . Question 65 .2 out of 2 points
  409.  
  410. In ____ addressing, only Class A, Class B, and Class C addresses are recognized.Answer
  411. Correct Answer:
  412. classful
  413.  
  414. . Question 66 .0 out of 2 points
  415.  
  416. Among all video-over-IP applications, ____ is perhaps the simplest.Answer
  417. Correct Answer:
  418. streaming video
  419.  
  420. . Question 67 .2 out of 2 points
  421.  
  422. An example of a popular mail server is ____.Answer
  423. Correct Answer:
  424. Microsoft Exchange Server
  425.  
  426. . Question 68 .0 out of 2 points
  427.  
  428. IMAP4 servers require less storage space and usually more processing resources than POP servers do.Answer
  429.  
  430. Correct Answer: False
  431.  
  432. . Question 69 .2 out of 2 points
  433.  
  434. In CIDR, conventional network class distinctions do not exist.Answer
  435.  
  436. Correct Answer: True
  437.  
  438. . Question 70 .2 out of 2 points
  439.  
  440. The most comprehensive and complex upgrade involving network hardware is a(n) ____ upgrade.Answer
  441. Correct Answer:
  442. backbone
  443.  
  444. . Question 71 .0 out of 2 points
  445.  
  446. A(n) ____ is a graphical representation of a network’s devices and connections.Answer
  447. Correct Answer:
  448. network diagram
  449.  
  450. . Question 72 .2 out of 2 points
  451.  
  452. The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.Answer
  453.  
  454. Correct Answer: False
  455.  
  456. . Question 73 .2 out of 2 points
  457.  
  458. ____ are often considered first-level support.Answer
  459. Correct Answer:
  460. Help desk analysts
  461.  
  462. . Question 74 .0 out of 2 points
  463.  
  464. IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.Answer
  465. Correct Answer:
  466. video over IP
  467.  
  468. . Question 75 .0 out of 2 points
  469.  
  470. ____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.Answer
  471. Correct Answer:
  472. Configuration
  473.  
  474. . Question 76 .2 out of 2 points
  475.  
  476. The use of certificate authorities to associate public keys with certain users is known as ____.Answer
  477. Correct Answer:
  478. PKI
  479.  
  480. . Question 77 .2 out of 2 points
  481.  
  482. A(n) ____ is a list that organizes resources and associates them with their characteristics.Answer
  483. Correct Answer:
  484. directory
  485.  
  486. . Question 78 .2 out of 2 points
  487.  
  488. Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.Answer
  489. Correct Answer:
  490. justify
  491.  
  492. . Question 79 .2 out of 2 points
  493.  
  494. A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.Answer
  495.  
  496. Correct Answer: False
  497.  
  498. . Question 80 .2 out of 2 points
  499.  
  500. In a ____ attack, a person redirects or captures secure transmissions as they occur.Answer
  501. Correct Answer:
  502. man-in-the-middle
  503.  
  504. . Question 81 .2 out of 2 points
  505.  
  506. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.Answer
  507. Correct Answer:
  508. Traffic shaping
  509.  
  510. . Question 82 .2 out of 2 points
  511.  
  512. Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.Answer
  513. Correct Answer:
  514. toll bypass
  515.  
  516. . Question 83 .2 out of 2 points
  517.  
  518. Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.Answer
  519.  
  520. Correct Answer: True
  521.  
  522. . Question 84 .2 out of 2 points
  523.  
  524. ____ is one of the most important functions an NOS provides.Answer
  525. Correct Answer:
  526. Client support
  527.  
  528. . Question 85 .2 out of 2 points
  529.  
  530. A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.Answer
  531. Correct Answer:
  532. concentrator
  533.  
  534. . Question 86 .2 out of 2 points
  535.  
  536. Tone generators and tone locators are used to determine characteristics about a cable.Answer
  537.  
  538. Correct Answer: False
  539.  
  540. . Question 87 .0 out of 2 points
  541.  
  542. The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.Answer
  543. Correct Answer:
  544. 1000
  545.  
  546. . Question 88 .2 out of 2 points
  547.  
  548. UNIX was one of the first operating systems to implement a ____ file system.Answer
  549. Correct Answer:
  550. hierarchical
  551.  
  552. . Question 89 .2 out of 2 points
  553.  
  554. In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.Answer
  555. Correct Answer:
  556. IP-PBX
  557.  
  558. . Question 90 .2 out of 2 points
  559.  
  560. Active Directory organizes multiple domains hierarchically in a domain ____.Answer
  561. Correct Answer:
  562. tree
  563.  
  564. . Question 91 .2 out of 2 points
  565.  
  566. A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.Answer
  567. Correct Answer:
  568. network monitor
  569.  
  570. . Question 92 .2 out of 2 points
  571.  
  572. CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.Answer
  573. Correct Answer:
  574. forward slash ( / )
  575.  
  576. . Question 93 .2 out of 2 points
  577.  
  578. ____ messaging is a service that makes several forms of communication available from a single user interface.Answer
  579. Correct Answer:
  580. Unified
  581.  
  582. . Question 94 .2 out of 2 points
  583.  
  584. ____ signaling functions are more limited than those performed by the protocols in the H.323 group.Answer
  585. Correct Answer:
  586. SIP
  587.  
  588. . Question 95 .0 out of 2 points
  589.  
  590. A(n) ____ is a deviation from a specified level of system performance for a given period of time.Answer
  591. Correct Answer:
  592. failure
  593.  
  594. . Question 96 .0 out of 2 points
  595.  
  596. The core of all UNIX and Linux systems is called the kernel.Answer
  597.  
  598. Correct Answer: True
  599.  
  600. . Question 97 .2 out of 2 points
  601.  
  602. Solaris employs the file system called ____ for its native file system type.Answer
  603. Correct Answer:
  604. UFS
  605.  
  606. . Question 98 .2 out of 2 points
  607.  
  608. Most wireless testing tools contain more powerful antennas than a workstation NIC.Answer
  609.  
  610. Correct Answer: True
  611.  
  612. . Question 99 .2 out of 2 points
  613.  
  614. SIP and H.323 account for communication between media gateways.Answer
  615.  
  616. Correct Answer: False
  617.  
  618. . Question 100 .0 out of 2 points
  619.  
  620. By default, the 802.11 standard offers substantial security.Answer
  621.  
  622. Correct Answer: False
  623.  
  624. . Question 101 .2 out of 2 points
  625.  
  626. Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.Answer
  627. Correct Answer:
  628. reserved
  629.  
  630. . Question 102 .2 out of 2 points
  631.  
  632. ____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.Answer
  633. Correct Answer:
  634. Ghosts
  635.  
  636. . Question 103 .0 out of 2 points
  637.  
  638. A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.Answer
  639. Correct Answer:
  640. transmission and hardware
  641.  
  642. . Question 104 .0 out of 2 points
  643.  
  644. An administrator can discover the host name assigned to a client by using the ____ utility.Answer
  645. Correct Answer:
  646. hostname
  647.  
  648. . Question 105 .0 out of 2 points
  649.  
  650. When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.Answer
  651. Correct Answer:
  652. bridge
  653.  
  654. . Question 106 .2 out of 2 points
  655.  
  656. ____ is intended to eliminate single points of failure.Answer
  657. Correct Answer:
  658. Redundancy
  659.  
  660. . Question 107 .0 out of 2 points
  661.  
  662. ____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.Answer
  663. Correct Answer:
  664. Application
  665.  
  666. . Question 108 .2 out of 2 points
  667.  
  668. A(n) ____ is a computer that manages multiple media gateways.Answer
  669. Correct Answer:
  670. MGC
  671.  
  672. . Question 109 .2 out of 2 points
  673.  
  674. ____ is the telltale factor for ascertaining where faults in a cable lie.Answer
  675. Correct Answer:
  676. Impedance
  677.  
  678. . Question 110 .2 out of 2 points
  679.  
  680. The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.Answer
  681. Correct Answer:
  682. physical
  683.  
  684. . Question 111 .2 out of 2 points
  685.  
  686. Encryption is the last means of defense against data theft.Answer
  687.  
  688. Correct Answer: True
  689.  
  690. . Question 112 .2 out of 2 points
  691.  
  692. Mesh topologies and ____ topologies are good choices for highly available enterprise networks.Answer
  693. Correct Answer:
  694. SONET rings
  695.  
  696. . Question 113 .2 out of 2 points
  697.  
  698. A ____ usually results from a bad NIC.Answer
  699. Correct Answer:
  700. jabber
  701.  
  702. . Question 114 .2 out of 2 points
  703.  
  704. In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.Answer
  705. Correct Answer:
  706. crossover
  707.  
  708. . Question 115 .0 out of 2 points
  709.  
  710. For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.Answer
  711.  
  712. Correct Answer: False
  713.  
  714. . Question 116 .2 out of 2 points
  715.  
  716. A(n) ____ is a self-contained, well-defined task within a process.Answer
  717. Correct Answer:
  718. thread
  719.  
  720. . Question 117 .2 out of 2 points
  721.  
  722. Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.Answer
  723.  
  724. Correct Answer: True
  725.  
  726. . Question 118 .2 out of 2 points
  727.  
  728. A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.Answer
  729. Correct Answer:
  730. denial-of-service
  731.  
  732. . Question 119 .2 out of 2 points
  733.  
  734. ____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.Answer
  735. Correct Answer:
  736. UDP
  737.  
  738. . Question 120 .0 out of 2 points
  739.  
  740. ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.Answer
  741. Correct Answer:
  742. Heuristic
  743.  
  744. . Question 121 .2 out of 2 points
  745.  
  746. A ____ can be used to intercept a telephone conversation.Answer
  747. Correct Answer:
  748. butt set
  749.  
  750. . Question 122 .0 out of 2 points
  751.  
  752. A____ is a small electronic device that issues a signal on a wire pair.Answer
  753. Correct Answer:
  754. tone generator
  755.  
  756. . Question 123 .0 out of 2 points
  757.  
  758. The ____ utility allows you to view a host’s routing table.Answer
  759. Correct Answer:
  760. route
  761.  
  762. . Question 124 .0 out of 2 points
  763.  
  764. The result from ANDing 11001111 with 10010001 is ____.Answer
  765. Correct Answer:
  766. 10000001
  767.  
  768. . Question 125 .2 out of 2 points
  769.  
  770. In ____, both computers verify the credentials of the other.Answer
  771. Correct Answer:
  772. mutual authentication
  773.  
  774. . Question 126 .0 out of 2 points
  775.  
  776. Power that is free from noise is called “____” power.Answer
  777. Correct Answer:
  778. clean
  779.  
  780. . Question 127 .2 out of 2 points
  781.  
  782. Continuity testers can test only copper cable.Answer
  783.  
  784. Correct Answer: False
  785.  
  786. . Question 128 .2 out of 2 points
  787.  
  788. ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.Answer
  789. Correct Answer:
  790. Integrity checking
  791.  
  792. . Question 129 .2 out of 2 points
  793.  
  794. Within a classful addressing, ____ is the default subnet mask for a Class C address.Answer
  795. Correct Answer:
  796. 255.255.255.0
  797.  
  798. . Question 130 .0 out of 2 points
  799.  
  800. In classful addressing, the Class B IPv4 address network ID is located in the ____.Answer
  801. Correct Answer:
  802. first 16 bits
  803.  
  804. . Question 131 .0 out of 2 points
  805.  
  806. Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.Answer
  807. Correct Answer:
  808. unicast
  809.  
  810. . Question 132 .0 out of 2 points
  811.  
  812. A ____ is a major change to a software package’s existing code.Answer
  813. Correct Answer:
  814. software upgrade
  815.  
  816. . Question 133 .0 out of 2 points
  817.  
  818. A networked ____ is perhaps the simplest device to add.Answer
  819. Correct Answer:
  820. workstation
  821.  
  822. . Question 134 .2 out of 2 points
  823.  
  824. On a network using TCP/IP, some nodes may use multiple IP addresses.Answer
  825.  
  826. Correct Answer: True
  827.  
  828. . Question 135 .2 out of 2 points
  829.  
  830. ____ provides redundancy through a process called disk mirroring.Answer
  831. Correct Answer:
  832. RAID Level 1
  833.  
  834. . Question 136 .2 out of 2 points
  835.  
  836. Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.Answer
  837. Correct Answer:
  838. LDAP
  839.  
  840. . Question 137 .2 out of 2 points
  841.  
  842. The gateways that make up the Internet backbone are called ____ gateways.Answer
  843. Correct Answer:
  844. core
  845.  
  846. . Question 138 .2 out of 2 points
  847.  
  848. An example of a popular client email software is ____.Answer
  849. Correct Answer:
  850. Microsoft Outlook
  851.  
  852. . Question 139 .2 out of 2 points
  853.  
  854. Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.Answer
  855.  
  856. Correct Answer: True
  857.  
  858. . Question 140 .2 out of 2 points
  859.  
  860. Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.Answer
  861. Correct Answer:
  862. traffic
  863.  
  864. . Question 141 .2 out of 2 points
  865.  
  866. It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.Answer
  867.  
  868. Correct Answer: True
  869.  
  870. . Question 142 .0 out of 2 points
  871.  
  872. The goal of fault-tolerant systems is to prevent failures from progressing to faults.Answer
  873.  
  874. Correct Answer: False
  875.  
  876. . Question 143 .2 out of 2 points
  877.  
  878. A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.Answer
  879.  
  880. Correct Answer: False
  881.  
  882. . Question 144 .2 out of 2 points
  883.  
  884. A(n) ____ is a graphical representation of a network’s wired infrastructure.Answer
  885. Correct Answer:
  886. wiring schematic
  887.  
  888. . Question 145 .2 out of 2 points
  889.  
  890. ____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.Answer
  891. Correct Answer:
  892. Performance
  893.  
  894. . Question 146 .2 out of 2 points
  895.  
  896. ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer
  897. Correct Answer:
  898. Signature
  899.  
  900. . Question 147 .2 out of 2 points
  901.  
  902. Many network engineers consider ____ to be superior to MGCP.Answer
  903. Correct Answer:
  904. MEGACO
  905.  
  906. . Question 148 .2 out of 2 points
  907.  
  908. An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.Answer
  909. Correct Answer:
  910. bit
  911.  
  912. . Question 149 .2 out of 2 points
  913.  
  914. RADIUS and TACACS belong to a category of protocols known as AAA (____).Answer
  915. Correct Answer:
  916. authentication, authorization, and accounting
  917.  
  918. . Question 150 .2 out of 2 points
  919.  
  920. POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.Answer
  921.  
  922. Correct Answer: True
  923.  
  924. .Wednesday, February 2, 2011 7:27:39 PM CST
  925.  
  926. OK
  927. .
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement