Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SBOLC Network+ Final Test 009-16 -Answered, Exams of Advanced Education

SBOLC Network+ Final Test 009-16 -Answered

Typology: Exams

2023/2024

Available from 08/24/2024

Examproff
Examproff 🇺🇸

1

(1)

6K documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SBOLC Network+ Final Test 009-16 -Answered
_______________ act on behalf of the whole network to completely separate packets
from internal hosts and external hosts - ANSWER-Proxies
A _______________ firewall keeps track of the established connections passing
through it. - ANSWER-Stateful
A baseline contains information about which resources on a network component?
(Choose all that apply) - ANSWER-Processor
Hard disk
memory
network adapter
A(n) ______________ learns what is "normal" on the network and can react to
abnormalities even if they are not part of the signature database. - ANSWER-IPS
An IPv6 address is 128 bits of decimal values separated by colons? True or False -
ANSWER-False
At which layer of the OSI model would you find IP? - ANSWER-Network
Changing network configurations, termination sessions, and deceiving the attacker are
actions that can be taken from what type of security device? - ANSWER-Intrusion
Prevention System (IPS)
Client-server logical network provides centralized authentication for your users? True or
False - ANSWER-True
Fiber-optic cable is immune to electromagnetic interference (EMI) and radio frequency
interference (RFI) because it does this. - ANSWER-Transmits digital signals using light
impulses
Host 1 sent a SYN packet to Host 2. What will Host 2 send in response? - ANSWER-
SYN-ACK
How is a T1 crossover cable crosses wired? - ANSWER-Pins 1, 2, 4, and 5 are
connected to 4, 5, 1, and 2
How many wires are used in a 100 Mbps UTP transmission? - ANSWER-4
IDS systems can identify attackers by their ______________. - ANSWER-Signature
If you implement a set of policies and procedures that define corporate information as
confidential and then train employees on these procedures, what type of attack can you
prevent? - ANSWER-Social Engineering
pf3
pf4
pf5

Partial preview of the text

Download SBOLC Network+ Final Test 009-16 -Answered and more Exams Advanced Education in PDF only on Docsity!

SBOLC Network+ Final Test 009-16 -Answered

_______________ act on behalf of the whole network to completely separate packets from internal hosts and external hosts - ANSWER-Proxies A _______________ firewall keeps track of the established connections passing through it. - ANSWER-Stateful A baseline contains information about which resources on a network component? (Choose all that apply) - ANSWER-Processor Hard disk memory network adapter A(n) ______________ learns what is "normal" on the network and can react to abnormalities even if they are not part of the signature database. - ANSWER-IPS An IPv6 address is 128 bits of decimal values separated by colons? True or False - ANSWER-False At which layer of the OSI model would you find IP? - ANSWER-Network Changing network configurations, termination sessions, and deceiving the attacker are actions that can be taken from what type of security device? - ANSWER-Intrusion Prevention System (IPS) Client-server logical network provides centralized authentication for your users? True or False - ANSWER-True Fiber-optic cable is immune to electromagnetic interference (EMI) and radio frequency interference (RFI) because it does this. - ANSWER-Transmits digital signals using light impulses Host 1 sent a SYN packet to Host 2. What will Host 2 send in response? - ANSWER- SYN-ACK How is a T1 crossover cable crosses wired? - ANSWER-Pins 1, 2, 4, and 5 are connected to 4, 5, 1, and 2 How many wires are used in a 100 Mbps UTP transmission? - ANSWER- IDS systems can identify attackers by their ______________. - ANSWER-Signature If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures, what type of attack can you prevent? - ANSWER-Social Engineering

In general, firewalls work by ________________? - ANSWER-Allowing only packets that pass security restrictions to be forwarded. In what type of network are all computers considered equals and they do not share any central authority? - ANSWER-Peer-to-peer In which layer of the OSI model do software firewalls operate? (Choose all that apply) - ANSWER-Application; Network In which of the following categories is UTP cable not rated? - ANSWER-Category 8 In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop? - ANSWER-War driving Load testing, connectivity testing, and throughput testing are examples of what? - ANSWER-Network Monitoring Monkey B, Michelangelo, Stoned, and Stealth boot are examples of which type of virus?

  • ANSWER-Boot Sector Of the following, which is the highest layer in the OSI model? - ANSWER-Presentation ou have upgraded the firmware on your switches and access points. What documentation do you need to update? - ANSWER-Baselines and configuration documentation RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to re-converge. Which can you implement to improve convergence time in the network? - ANSWER-Update RIP to OSPF using link- state RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so more efficiently. What type of transmission does RIPv2 use to accomplish this task? - ANSWER-Multicasts Routers perform routing at which OSI layer? - ANSWER-Network Segmentation of a data stream happens at which layer of the OSI model? - ANSWER- Transport Select the IP addresses that would not pass the router without NAT? - ANSWER- 10.0.0.5, 192.168.11.4, 172.16.22.

What is the main difference between a worm and a virus? - ANSWER-Worms can replicate without user intervention What is the main difference between single-mode fiber (SMF and multimode fiber (MMF)? - ANSWER-Number of light rays What is the purpose of flow control? - ANSWER-To provide a means for the receiver to govern the amount of data sent by the sender What kind of attack involves the hacker attempting all combinations of characters for a password to gain access? - ANSWER-Brute-force attack What process allows you to update your Windows-based operating system? - ANSWER-Windows Update What routing protocol is typically used to connect ASs on the Internet? - ANSWER-BGP What term describes technologies that can deliver voice communications over the Internet? - ANSWER-Voice Over Internet Protocol What type of connector does UTP cable typically use? - ANSWER-RJ- What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses? - ANSWER-Definition Files What type of scan can be done by an antivirus program? - ANSWER-All of the above > Emergency; In-demand; on-access What type of security threat allows an attacker to learn your password through the use of an email or phone call? - ANSWER-Phishing What type of wireless frame populates the display when someone is scanning for Wireless Networks? - ANSWER-Beacon What will you install if you need a scalable topology? - ANSWER-Star When data is encapsulated, which is the correct order? - ANSWER-Data, Segment, Packet, Frame, Bits Which device can limit traffic on a network and allow access onto specific TCP/IP port numbers when security is a concern? - ANSWER-Firewall Which IEEE standard specifies the protocol for CSMA/CD? - ANSWER-802. Which IPv6 routing protocol uses UDP port 521? - ANSWER-RIPng

Which is not a type of threat that can affect your network? - ANSWER-Access control lists Which is true regarding EIGRP successor routes? - ANSWER-A successor route is used by EIGRP to forward traffic to a destination Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications? - ANSWER-Traffic shaping Which of the following are considered distance vector routing protocols? (Choose Two)

  • ANSWER-RIP RIPv Which of the following are considered link state routing protocols? (choose two) - ANSWER-IS-IS OSPF Which of the following are types of services that firewalls can provide? - ANSWER-All of the above Which of the following describes routing convergence time? - ANSWER-The time required by protocols to update their forwarding tables after changes have occurred. Which of the following Ethernet Unshielded twisted pair cabling types are commonly used? - ANSWER-All of the above > 1000 Base TX; 100 Base TX; 10 Base T Which of the following is a concern when using peer-to-peer networks? - ANSWER-The security associated with such a network Which of the following is a disadvantage of the star topology? - ANSWER-When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. Which of the following is a type of denial of service attack? - ANSWER-All of the above

Ping of Death SYN Flood Stacheldraht Which of the following is a vendor-specific routing protocol? - ANSWER-EIGRP Which of the following is a vulnerability scanner? - ANSWER-NESSUS Which of the following is considered a hybrid routing protocol? - ANSWER-EIGRP

Which type of security device monitors network traffic, looking for signs of an intrusion?

  • ANSWER-Intrusion Detection System (IDS) Which type of virus affects both the boot sector and files on a computer? - ANSWER- Multipartite Which type of virus impacts files with the filename extensions .com, .exe, and .dll? - ANSWER-File Viruses Which type of WAN technology uses labels, which enables priority of voice though the network? - ANSWER-MPLS Which type of Windows server log will give information about specific programs? - ANSWER-Application Which value does a wireless station use to choose an access point? - ANSWER-SSID Why is it important to keep your system patched and uptodate? - ANSWER-To fix system vulnerabilities Why would you want to use a dynamic routing protocol instead of using static routes? - ANSWER-Dynamic routing scales to larger networks With the star topology, what will be the result of a device losing its physical network connection? - ANSWER-Only that workstation loses its ability to communicate You have a network with multiple devices and need to have a smaller broadcast domain while working with a single device. Which of the following is the best solution? - ANSWER-Install a router You have added a new cable segment to your network. You need to make sure you document this for troubleshooting purposes. What should you update? - ANSWER-The wiring schematics You need a network that provides centralized authentication for your users. Which of the following logical topologies should you use? - ANSWER-Client-server You need to connect two devices on a vertical connect and they need to send voice traffic. Which of the following cables is the best option? - ANSWER-Cat 5 You need to make a 568B cable for a Fast Ethernet link. How many wire pairs will you use? - ANSWER-