Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Current Location Network+ ITNW1458.20101122.257400 Quizzes & Exams Review Test Submission: Final Exam
- .
- Menu Management Options
- Expand AllCollapse All
- ..Course Menu:Network+ (ITNW1458.20101122.257400)
- Announcements .Instructor .Messaging
- --------------------------------------------------------------------------------
- .Syllabus .Lessons .Web Based Labs .Presentations .Book Ch 1-6 .Quizzes & Exams .Discussion Board
- --------------------------------------------------------------------------------
- .Tools .Communications .Plagarism .Non Course Links .Evaluation .Review Test Submission: Final Exam.ContentUser Lucas Schwartz
- Submitted 2/2/11 7:27 PM
- Name Final Exam
- Status Completed
- Score 226 out of 300 points
- Time Elapsed 57 minutes, and 55 seconds out of 2 hours.
- Instructions
- Question 1 .2 out of 2 points
- ____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.Answer
- Correct Answer:
- Phishing
- . Question 2 .2 out of 2 points
- A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.Answer
- Correct Answer:
- duplicate
- . Question 3 .2 out of 2 points
- A computer programmed to act like an IP telephone is known as a(n) ____.Answer
- Correct Answer:
- softphone
- . Question 4 .2 out of 2 points
- IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.Answer
- Correct Answer:
- POP3
- . Question 5 .2 out of 2 points
- ____ software searches a node for open ports.Answer
- Correct Answer:
- Port scanner
- . Question 6 .0 out of 2 points
- SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.Answer
- Correct Answer:
- call signaling and control
- . Question 7 .0 out of 2 points
- All VoIP calls are carried over the Internet.Answer
- Correct Answer: False
- . Question 8 .2 out of 2 points
- ____ describes the use of any network to carry voice signals using the TCP/IP protocol.Answer
- Correct Answer:
- IP telephony
- . Question 9 .0 out of 2 points
- ____ is a method of encrypting TCP/IP transmissions.Answer
- Correct Answer:
- SSL
- . Question 10 .0 out of 2 points
- The combination of a public key and a private key is known as a ____.Answer
- Correct Answer:
- key pair
- . Question 11 .2 out of 2 points
- A patch is a replacement for an entire software package.Answer
- Correct Answer: False
- . Question 12 .2 out of 2 points
- ____ is the use of one network to simultaneously carry voice, video, and data communications.Answer
- Correct Answer:
- Convergence
- . Question 13 .2 out of 2 points
- A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.Answer
- Correct Answer:
- router’s
- . Question 14 .0 out of 2 points
- The process of reverting to a previous version of software after attempting to upgrade it is known as ____.Answer
- Correct Answer:
- backleveling
- . Question 15 .2 out of 2 points
- A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.Answer
- Correct Answer:
- supported services list
- . Question 16 .2 out of 2 points
- Network security is more often compromised “from the inside” than from external sources.Answer
- Correct Answer: True
- . Question 17 .2 out of 2 points
- A ____ is a program that runs automatically, without requiring a person to start or stop it.Answer
- Correct Answer:
- bot
- . Question 18 .2 out of 2 points
- Some software errors point to a physical connectivity problem.Answer
- Correct Answer: True
- . Question 19 .0 out of 2 points
- A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.Answer
- Correct Answer:
- dictionary
- . Question 20 .2 out of 2 points
- ____ management refers to the detection and signaling of device, link, or component faults.Answer
- Correct Answer:
- Fault
- . Question 21 .2 out of 2 points
- A(n) ____ virus changes its characteristics every time it is transferred to a new system.Answer
- Correct Answer:
- polymorphic
- . Question 22 .0 out of 2 points
- Above all, keep ____ in mind when you upgrade or install hardware on a network.Answer
- Correct Answer:
- safety
- . Question 23 .2 out of 2 points
- Protection against harmful code involves more than just installing anti-malware software.Answer
- Correct Answer: True
- . Question 24 .2 out of 2 points
- ____ are programs that run independently and travel between computers and across networks.Answer
- Correct Answer:
- Worms
- . Question 25 .2 out of 2 points
- SMTP operates from port ____.Answer
- Correct Answer:
- 25
- . Question 26 .2 out of 2 points
- The support and use of multiple processors to handle multiple threads is known as ____.Answer
- Correct Answer:
- multiprocessing
- . Question 27 .2 out of 2 points
- When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.Answer
- Correct Answer:
- packet
- . Question 28 .0 out of 2 points
- Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.Answer
- Correct Answer:
- 1
- . Question 29 .2 out of 2 points
- The directory containing information about objects in a domain resides on computers called ____ controllers.Answer
- Correct Answer:
- domain
- . Question 30 .2 out of 2 points
- ____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.Answer
- Correct Answer:
- PGP
- . Question 31 .2 out of 2 points
- A ____ is a network device devoted to storage and delivery of frequently requested files.Answer
- Correct Answer:
- cache engine
- . Question 32 .2 out of 2 points
- The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.Answer
- Correct Answer:
- kernel
- . Question 33 .2 out of 2 points
- A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.Answer
- Correct Answer:
- digital certificate
- . Question 34 .0 out of 2 points
- A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.Answer
- Correct Answer:
- brute force
- . Question 35 .2 out of 2 points
- A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.Answer
- Correct Answer:
- packet-filtering
- . Question 36 .0 out of 2 points
- In classful addressing, Class C IPv4 address host information is located in the ____.Answer
- Correct Answer:
- last 8 bits
- . Question 37 .2 out of 2 points
- ____is the local storage of frequently needed files that would otherwise be obtained from an external source.Answer
- Correct Answer:
- Caching
- . Question 38 .2 out of 2 points
- ____ is a fundamental property of wire that depends on a wire’s molecular structure and size.Answer
- Correct Answer:
- Resistance
- . Question 39 .2 out of 2 points
- ____ protocols are the rules that computers follow to accomplish authentication.Answer
- Correct Answer:
- Authentication
- . Question 40 .2 out of 2 points
- An off-the-shelf workstation can be programmed to act like an IP telephone.Answer
- Correct Answer: True
- . Question 41 .2 out of 2 points
- A ____ is a correction, improvement, or enhancement to a particular piece of a software application.Answer
- Correct Answer:
- patch
- . Question 42 .2 out of 2 points
- A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.Answer
- Correct Answer:
- GUI
- . Question 43 .2 out of 2 points
- IP telephones are directly connected to the local loop.Answer
- Correct Answer: False
- . Question 44 .2 out of 2 points
- A(n) ____ virus disguises itself as a legitimate program to prevent detection.Answer
- Correct Answer:
- stealth
- . Question 45 .0 out of 2 points
- In ____, parity error checking occurs when data is written across the disk array.Answer
- Correct Answer:
- RAID Level 3
- . Question 46 .2 out of 2 points
- The process of copying directory data to multiple domain controllers is known as ____.Answer
- Correct Answer:
- replication
- . Question 47 .2 out of 2 points
- When using classful IPv4 addressing, a network ID always ends with an octet of ____.Answer
- Correct Answer:
- 0
- . Question 48 .2 out of 2 points
- To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.Answer
- Correct Answer:
- promiscuous
- . Question 49 .2 out of 2 points
- The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.Answer
- Correct Answer:
- default
- . Question 50 .2 out of 2 points
- POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.Answer
- Correct Answer:
- 110
- . Question 51 .2 out of 2 points
- A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.Answer
- Correct Answer:
- server
- . Question 52 .2 out of 2 points
- Resistance is measured in ____.Answer
- Correct Answer:
- ohms
- . Question 53 .2 out of 2 points
- A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.Answer
- Correct Answer:
- software routine
- . Question 54 .2 out of 2 points
- A program that disguises itself as something useful but actually harms your system is called a ____.Answer
- Correct Answer:
- Trojan horse
- . Question 55 .2 out of 2 points
- The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.Answer
- Correct Answer:
- polling
- . Question 56 .2 out of 2 points
- ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.Answer
- Correct Answer:
- Optical media
- . Question 57 .2 out of 2 points
- A key component in managing networks is identifying and tracking its hardware and software through ____ management.Answer
- Correct Answer:
- asset
- . Question 58 .2 out of 2 points
- When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.Answer
- Correct Answer:
- voltage
- . Question 59 .0 out of 2 points
- ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.Answer
- Correct Answer:
- NAS
- . Question 60 .2 out of 2 points
- Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.Answer
- Correct Answer:
- man
- . Question 61 .2 out of 2 points
- A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.Answer
- Correct Answer:
- pathping
- . Question 62 .2 out of 2 points
- ____ is a measure of how well a network service matches its expected performance.Answer
- Correct Answer:
- QoS
- . Question 63 .2 out of 2 points
- A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.Answer
- Correct Answer:
- online
- . Question 64 .0 out of 2 points
- ____ are often considered third-level support.Answer
- Correct Answer:
- Help desk coordinators
- . Question 65 .2 out of 2 points
- In ____ addressing, only Class A, Class B, and Class C addresses are recognized.Answer
- Correct Answer:
- classful
- . Question 66 .0 out of 2 points
- Among all video-over-IP applications, ____ is perhaps the simplest.Answer
- Correct Answer:
- streaming video
- . Question 67 .2 out of 2 points
- An example of a popular mail server is ____.Answer
- Correct Answer:
- Microsoft Exchange Server
- . Question 68 .0 out of 2 points
- IMAP4 servers require less storage space and usually more processing resources than POP servers do.Answer
- Correct Answer: False
- . Question 69 .2 out of 2 points
- In CIDR, conventional network class distinctions do not exist.Answer
- Correct Answer: True
- . Question 70 .2 out of 2 points
- The most comprehensive and complex upgrade involving network hardware is a(n) ____ upgrade.Answer
- Correct Answer:
- backbone
- . Question 71 .0 out of 2 points
- A(n) ____ is a graphical representation of a network’s devices and connections.Answer
- Correct Answer:
- network diagram
- . Question 72 .2 out of 2 points
- The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.Answer
- Correct Answer: False
- . Question 73 .2 out of 2 points
- ____ are often considered first-level support.Answer
- Correct Answer:
- Help desk analysts
- . Question 74 .0 out of 2 points
- IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.Answer
- Correct Answer:
- video over IP
- . Question 75 .0 out of 2 points
- ____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.Answer
- Correct Answer:
- Configuration
- . Question 76 .2 out of 2 points
- The use of certificate authorities to associate public keys with certain users is known as ____.Answer
- Correct Answer:
- PKI
- . Question 77 .2 out of 2 points
- A(n) ____ is a list that organizes resources and associates them with their characteristics.Answer
- Correct Answer:
- directory
- . Question 78 .2 out of 2 points
- Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.Answer
- Correct Answer:
- justify
- . Question 79 .2 out of 2 points
- A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.Answer
- Correct Answer: False
- . Question 80 .2 out of 2 points
- In a ____ attack, a person redirects or captures secure transmissions as they occur.Answer
- Correct Answer:
- man-in-the-middle
- . Question 81 .2 out of 2 points
- ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.Answer
- Correct Answer:
- Traffic shaping
- . Question 82 .2 out of 2 points
- Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.Answer
- Correct Answer:
- toll bypass
- . Question 83 .2 out of 2 points
- Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.Answer
- Correct Answer: True
- . Question 84 .2 out of 2 points
- ____ is one of the most important functions an NOS provides.Answer
- Correct Answer:
- Client support
- . Question 85 .2 out of 2 points
- A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.Answer
- Correct Answer:
- concentrator
- . Question 86 .2 out of 2 points
- Tone generators and tone locators are used to determine characteristics about a cable.Answer
- Correct Answer: False
- . Question 87 .0 out of 2 points
- The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.Answer
- Correct Answer:
- 1000
- . Question 88 .2 out of 2 points
- UNIX was one of the first operating systems to implement a ____ file system.Answer
- Correct Answer:
- hierarchical
- . Question 89 .2 out of 2 points
- In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.Answer
- Correct Answer:
- IP-PBX
- . Question 90 .2 out of 2 points
- Active Directory organizes multiple domains hierarchically in a domain ____.Answer
- Correct Answer:
- tree
- . Question 91 .2 out of 2 points
- A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.Answer
- Correct Answer:
- network monitor
- . Question 92 .2 out of 2 points
- CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.Answer
- Correct Answer:
- forward slash ( / )
- . Question 93 .2 out of 2 points
- ____ messaging is a service that makes several forms of communication available from a single user interface.Answer
- Correct Answer:
- Unified
- . Question 94 .2 out of 2 points
- ____ signaling functions are more limited than those performed by the protocols in the H.323 group.Answer
- Correct Answer:
- SIP
- . Question 95 .0 out of 2 points
- A(n) ____ is a deviation from a specified level of system performance for a given period of time.Answer
- Correct Answer:
- failure
- . Question 96 .0 out of 2 points
- The core of all UNIX and Linux systems is called the kernel.Answer
- Correct Answer: True
- . Question 97 .2 out of 2 points
- Solaris employs the file system called ____ for its native file system type.Answer
- Correct Answer:
- UFS
- . Question 98 .2 out of 2 points
- Most wireless testing tools contain more powerful antennas than a workstation NIC.Answer
- Correct Answer: True
- . Question 99 .2 out of 2 points
- SIP and H.323 account for communication between media gateways.Answer
- Correct Answer: False
- . Question 100 .0 out of 2 points
- By default, the 802.11 standard offers substantial security.Answer
- Correct Answer: False
- . Question 101 .2 out of 2 points
- Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.Answer
- Correct Answer:
- reserved
- . Question 102 .2 out of 2 points
- ____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.Answer
- Correct Answer:
- Ghosts
- . Question 103 .0 out of 2 points
- A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.Answer
- Correct Answer:
- transmission and hardware
- . Question 104 .0 out of 2 points
- An administrator can discover the host name assigned to a client by using the ____ utility.Answer
- Correct Answer:
- hostname
- . Question 105 .0 out of 2 points
- When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.Answer
- Correct Answer:
- bridge
- . Question 106 .2 out of 2 points
- ____ is intended to eliminate single points of failure.Answer
- Correct Answer:
- Redundancy
- . Question 107 .0 out of 2 points
- ____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.Answer
- Correct Answer:
- Application
- . Question 108 .2 out of 2 points
- A(n) ____ is a computer that manages multiple media gateways.Answer
- Correct Answer:
- MGC
- . Question 109 .2 out of 2 points
- ____ is the telltale factor for ascertaining where faults in a cable lie.Answer
- Correct Answer:
- Impedance
- . Question 110 .2 out of 2 points
- The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.Answer
- Correct Answer:
- physical
- . Question 111 .2 out of 2 points
- Encryption is the last means of defense against data theft.Answer
- Correct Answer: True
- . Question 112 .2 out of 2 points
- Mesh topologies and ____ topologies are good choices for highly available enterprise networks.Answer
- Correct Answer:
- SONET rings
- . Question 113 .2 out of 2 points
- A ____ usually results from a bad NIC.Answer
- Correct Answer:
- jabber
- . Question 114 .2 out of 2 points
- In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.Answer
- Correct Answer:
- crossover
- . Question 115 .0 out of 2 points
- For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.Answer
- Correct Answer: False
- . Question 116 .2 out of 2 points
- A(n) ____ is a self-contained, well-defined task within a process.Answer
- Correct Answer:
- thread
- . Question 117 .2 out of 2 points
- Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.Answer
- Correct Answer: True
- . Question 118 .2 out of 2 points
- A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.Answer
- Correct Answer:
- denial-of-service
- . Question 119 .2 out of 2 points
- ____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.Answer
- Correct Answer:
- UDP
- . Question 120 .0 out of 2 points
- ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.Answer
- Correct Answer:
- Heuristic
- . Question 121 .2 out of 2 points
- A ____ can be used to intercept a telephone conversation.Answer
- Correct Answer:
- butt set
- . Question 122 .0 out of 2 points
- A____ is a small electronic device that issues a signal on a wire pair.Answer
- Correct Answer:
- tone generator
- . Question 123 .0 out of 2 points
- The ____ utility allows you to view a host’s routing table.Answer
- Correct Answer:
- route
- . Question 124 .0 out of 2 points
- The result from ANDing 11001111 with 10010001 is ____.Answer
- Correct Answer:
- 10000001
- . Question 125 .2 out of 2 points
- In ____, both computers verify the credentials of the other.Answer
- Correct Answer:
- mutual authentication
- . Question 126 .0 out of 2 points
- Power that is free from noise is called “____” power.Answer
- Correct Answer:
- clean
- . Question 127 .2 out of 2 points
- Continuity testers can test only copper cable.Answer
- Correct Answer: False
- . Question 128 .2 out of 2 points
- ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.Answer
- Correct Answer:
- Integrity checking
- . Question 129 .2 out of 2 points
- Within a classful addressing, ____ is the default subnet mask for a Class C address.Answer
- Correct Answer:
- 255.255.255.0
- . Question 130 .0 out of 2 points
- In classful addressing, the Class B IPv4 address network ID is located in the ____.Answer
- Correct Answer:
- first 16 bits
- . Question 131 .0 out of 2 points
- Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.Answer
- Correct Answer:
- unicast
- . Question 132 .0 out of 2 points
- A ____ is a major change to a software package’s existing code.Answer
- Correct Answer:
- software upgrade
- . Question 133 .0 out of 2 points
- A networked ____ is perhaps the simplest device to add.Answer
- Correct Answer:
- workstation
- . Question 134 .2 out of 2 points
- On a network using TCP/IP, some nodes may use multiple IP addresses.Answer
- Correct Answer: True
- . Question 135 .2 out of 2 points
- ____ provides redundancy through a process called disk mirroring.Answer
- Correct Answer:
- RAID Level 1
- . Question 136 .2 out of 2 points
- Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.Answer
- Correct Answer:
- LDAP
- . Question 137 .2 out of 2 points
- The gateways that make up the Internet backbone are called ____ gateways.Answer
- Correct Answer:
- core
- . Question 138 .2 out of 2 points
- An example of a popular client email software is ____.Answer
- Correct Answer:
- Microsoft Outlook
- . Question 139 .2 out of 2 points
- Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.Answer
- Correct Answer: True
- . Question 140 .2 out of 2 points
- Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.Answer
- Correct Answer:
- traffic
- . Question 141 .2 out of 2 points
- It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.Answer
- Correct Answer: True
- . Question 142 .0 out of 2 points
- The goal of fault-tolerant systems is to prevent failures from progressing to faults.Answer
- Correct Answer: False
- . Question 143 .2 out of 2 points
- A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.Answer
- Correct Answer: False
- . Question 144 .2 out of 2 points
- A(n) ____ is a graphical representation of a network’s wired infrastructure.Answer
- Correct Answer:
- wiring schematic
- . Question 145 .2 out of 2 points
- ____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.Answer
- Correct Answer:
- Performance
- . Question 146 .2 out of 2 points
- ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer
- Correct Answer:
- Signature
- . Question 147 .2 out of 2 points
- Many network engineers consider ____ to be superior to MGCP.Answer
- Correct Answer:
- MEGACO
- . Question 148 .2 out of 2 points
- An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.Answer
- Correct Answer:
- bit
- . Question 149 .2 out of 2 points
- RADIUS and TACACS belong to a category of protocols known as AAA (____).Answer
- Correct Answer:
- authentication, authorization, and accounting
- . Question 150 .2 out of 2 points
- POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.Answer
- Correct Answer: True
- .Wednesday, February 2, 2011 7:27:39 PM CST
- OK
- .
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement