• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
With VTP, the VLAN database is stored on a switch known as which option below?​
​stack master
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?​
logic bomb​
How many channels exist in a T1 connection?​

24

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​
VPN gateway
​In a VoIP call, what method of transmission is used between two IP phones?
unicast
Network segmentation decreases both performance and security on a network.
False
In an IPv6 address, the first 64 bits of the address are known as what?​
​routing prefix
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
SIEM system
Which of the following is not a requirement in order to use a softphone?
​A wireless carrier to handle the voice path.
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?​
​MPLS
The Priority Code Point field in a frame consists of how many bits?
​3 bits
Telnet and SSH are known as what type of management system?​
​in-band
Packets that exceed the medium's maximum packet size are known by what term?​
​giants
​What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
​user agent server
​What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
​EAP
Which type of disaster recovery site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected?
​cold site
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
True
What is a historian?​
​A centralized database of collected and analyzed data and control activities.
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS​
Which of the following is not a valid reason for using virtualization?​
increase performance
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
True
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?​
​Citrix Xen
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?​
​PCI DSS
​If multiple honeypots are connected to form a larger network, what term is used to describe the network?
​honeynet
The Shortest Path Bridging protocol is defined in what IEEE standard?​
​802.1aq
A bus topology WAN is often the best option for an organization with only a few sites and the capability to use dedicated circuits.​
True
​Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
​Natas
Which team role is the person on call who first notices or is alerted to a problem?
​dispatcher
​RJ-48
When copper cabling is used to carry T-1 traffic, what kind of connector is used?
The first step in asset management is to inventory all the components on the network.​
True
At what layer of the OSI model does the IPSec encryption protocol operate?
​Network layer
​What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
​polymorphism
Which type of recovery site is a place where computers, devices, and connectivity necessary to rebuild a network exist, with some pieces ​appropriately configured, updated, or connected?
warm site
What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?​
​OC-48
A network with the subnet mask 255.255.255.0 would have what CIDR block?​
​/24
At what type of recovery site would computers, devices, and connectivity necessary to rebuilt a network exist, and all are appropriately configured, updated, and connected to match your network's current state?
​hot site
​Packets that are smaller than a medium's minimum packet size are known by what term below?
​runts
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
expedited forwarding​
What is the frequency range of the C-band that is used by satellites?
3.4 - 6.7 GHz