Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
With VTP, the VLAN database is stored on a switch known as which option below?
|
stack master
|
|
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?
|
logic bomb
|
|
How many channels exist in a T1 connection?
|
24 |
|
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
|
VPN gateway
|
|
In a VoIP call, what method of transmission is used between two IP phones?
|
unicast
|
|
Network segmentation decreases both performance and security on a network.
|
False
|
|
In an IPv6 address, the first 64 bits of the address are known as what?
|
routing prefix
|
|
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
|
SaaS
|
|
system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
|
SIEM system
|
|
Which of the following is not a requirement in order to use a softphone?
|
A wireless carrier to handle the voice path.
|
|
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
|
MPLS
|
|
The Priority Code Point field in a frame consists of how many bits?
|
3 bits
|
|
Telnet and SSH are known as what type of management system?
|
in-band
|
|
Packets that exceed the medium's maximum packet size are known by what term?
|
giants
|
|
What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
|
user agent server
|
|
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
|
EAP
|
|
Which type of disaster recovery site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected?
|
cold site
|
|
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
|
True
|
|
What is a historian?
|
A centralized database of collected and analyzed data and control activities.
|
|
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
|
IaaS
|
|
Which of the following is not a valid reason for using virtualization?
|
increase performance
|
|
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
|
True
|
|
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
|
Citrix Xen
|
|
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?
|
PCI DSS
|
|
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
|
honeynet
|
|
The Shortest Path Bridging protocol is defined in what IEEE standard?
|
802.1aq
|
|
A bus topology WAN is often the best option for an organization with only a few sites and the capability to use dedicated circuits.
|
True
|
|
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
|
Natas
|
|
Which team role is the person on call who first notices or is alerted to a problem?
|
dispatcher
|
|
RJ-48
|
When copper cabling is used to carry T-1 traffic, what kind of connector is used?
|
|
The first step in asset management is to inventory all the components on the network.
|
True
|
|
At what layer of the OSI model does the IPSec encryption protocol operate?
|
Network layer
|
|
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
|
polymorphism
|
|
Which type of recovery site is a place where computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured, updated, or connected?
|
warm site
|
|
What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?
|
OC-48
|
|
A network with the subnet mask 255.255.255.0 would have what CIDR block?
|
/24
|
|
At what type of recovery site would computers, devices, and connectivity necessary to rebuilt a network exist, and all are appropriately configured, updated, and connected to match your network's current state?
|
hot site
|
|
Packets that are smaller than a medium's minimum packet size are known by what term below?
|
runts
|
|
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
|
expedited forwarding
|
|
What is the frequency range of the C-band that is used by satellites?
|
3.4 - 6.7 GHz
|