



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
SBOLC Network+ Final Test 009-16 -Answered
Typology: Exams
1 / 7
This page cannot be seen from the preview
Don't miss anything!
_______________ act on behalf of the whole network to completely separate packets from internal hosts and external hosts - ANSWER-Proxies A _______________ firewall keeps track of the established connections passing through it. - ANSWER-Stateful A baseline contains information about which resources on a network component? (Choose all that apply) - ANSWER-Processor Hard disk memory network adapter A(n) ______________ learns what is "normal" on the network and can react to abnormalities even if they are not part of the signature database. - ANSWER-IPS An IPv6 address is 128 bits of decimal values separated by colons? True or False - ANSWER-False At which layer of the OSI model would you find IP? - ANSWER-Network Changing network configurations, termination sessions, and deceiving the attacker are actions that can be taken from what type of security device? - ANSWER-Intrusion Prevention System (IPS) Client-server logical network provides centralized authentication for your users? True or False - ANSWER-True Fiber-optic cable is immune to electromagnetic interference (EMI) and radio frequency interference (RFI) because it does this. - ANSWER-Transmits digital signals using light impulses Host 1 sent a SYN packet to Host 2. What will Host 2 send in response? - ANSWER- SYN-ACK How is a T1 crossover cable crosses wired? - ANSWER-Pins 1, 2, 4, and 5 are connected to 4, 5, 1, and 2 How many wires are used in a 100 Mbps UTP transmission? - ANSWER- IDS systems can identify attackers by their ______________. - ANSWER-Signature If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures, what type of attack can you prevent? - ANSWER-Social Engineering
In general, firewalls work by ________________? - ANSWER-Allowing only packets that pass security restrictions to be forwarded. In what type of network are all computers considered equals and they do not share any central authority? - ANSWER-Peer-to-peer In which layer of the OSI model do software firewalls operate? (Choose all that apply) - ANSWER-Application; Network In which of the following categories is UTP cable not rated? - ANSWER-Category 8 In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop? - ANSWER-War driving Load testing, connectivity testing, and throughput testing are examples of what? - ANSWER-Network Monitoring Monkey B, Michelangelo, Stoned, and Stealth boot are examples of which type of virus?
What is the main difference between a worm and a virus? - ANSWER-Worms can replicate without user intervention What is the main difference between single-mode fiber (SMF and multimode fiber (MMF)? - ANSWER-Number of light rays What is the purpose of flow control? - ANSWER-To provide a means for the receiver to govern the amount of data sent by the sender What kind of attack involves the hacker attempting all combinations of characters for a password to gain access? - ANSWER-Brute-force attack What process allows you to update your Windows-based operating system? - ANSWER-Windows Update What routing protocol is typically used to connect ASs on the Internet? - ANSWER-BGP What term describes technologies that can deliver voice communications over the Internet? - ANSWER-Voice Over Internet Protocol What type of connector does UTP cable typically use? - ANSWER-RJ- What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses? - ANSWER-Definition Files What type of scan can be done by an antivirus program? - ANSWER-All of the above > Emergency; In-demand; on-access What type of security threat allows an attacker to learn your password through the use of an email or phone call? - ANSWER-Phishing What type of wireless frame populates the display when someone is scanning for Wireless Networks? - ANSWER-Beacon What will you install if you need a scalable topology? - ANSWER-Star When data is encapsulated, which is the correct order? - ANSWER-Data, Segment, Packet, Frame, Bits Which device can limit traffic on a network and allow access onto specific TCP/IP port numbers when security is a concern? - ANSWER-Firewall Which IEEE standard specifies the protocol for CSMA/CD? - ANSWER-802. Which IPv6 routing protocol uses UDP port 521? - ANSWER-RIPng
Which is not a type of threat that can affect your network? - ANSWER-Access control lists Which is true regarding EIGRP successor routes? - ANSWER-A successor route is used by EIGRP to forward traffic to a destination Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications? - ANSWER-Traffic shaping Which of the following are considered distance vector routing protocols? (Choose Two)
Ping of Death SYN Flood Stacheldraht Which of the following is a vendor-specific routing protocol? - ANSWER-EIGRP Which of the following is a vulnerability scanner? - ANSWER-NESSUS Which of the following is considered a hybrid routing protocol? - ANSWER-EIGRP
Which type of security device monitors network traffic, looking for signs of an intrusion?