Networking I Chapters 9-12 Review – Flashcards

Unlock all answers in this set

Unlock answers
question
True
answer
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs
question
Determine if Escalation is Necessary
answer
The first step of a response policy
question
MPLS (Multi-Protocol Label Switching)
answer
The protocol that enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols
question
Stack Master
answer
The VLAN database is stored on this switch with VTP
question
MCU (Multipoint Control Unit)
answer
This is known as a computer that provides support for multiple H.323 terminals and manages communication between them
question
Media Gateway Controller
answer
This intermediate device is used in order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network
question
Ring Topology
answer
A type of topology where each site is connected to two other sites, providing redundancy
question
DMZ (Demilitarized Zone)
answer
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network, this is where they should be placed
question
True
answer
The first step in asset management is to inventory all the components on the network
question
Routing Prefix
answer
This is what the first 64 bits of an IPv6 address are known as
question
Bridged Mode
answer
Network type that allows a vNIC to access a network directly using the host machine's NIC
question
Runts
answer
Packets that are smaller than a medium's minimum packet size
question
161
answer
SNMP agents receive requests from an NMS on this port number
question
Split Horizon
answer
Layer 3 technology that is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or advertise, that same update on the same interface
question
True
answer
In a PON setup, the system is considered passive because no repeaters or other devices intervene between the carrier and the customer
question
Attempt to Access Files to Determine if They are Compromised
answer
A step that should NOT be taken as part of a response policy
question
Pull the Power Cable
answer
This step should be taken if a destructive program is running that might be destroying evidence
question
1/4 mile
answer
The best 802.11n signal can travel this far
question
True
answer
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge
question
5060
answer
A server running the SIP protocol listens on this TCP/UDP port for unsecured communications
question
Ambient Data
answer
Hidden files such as deleted files and file fragments
question
Jabber
answer
A device that handles electrical signals improperly, usually resulting from a bad NIC
question
3.4 - 6.7 GHz
answer
Frequency range of the C-band that is used by satellites
question
Carrier Ethernet Transport
answer
In metro settings, end-to-end, carrier-grade Ethernet networks are established via this protocol
question
BID (Bridge ID)
answer
STP selects the root bridge based on this
question
True
answer
Every security policy should include a response policy, which specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result
question
RJ-48
answer
Copper cabling used to carry T-1 traffic uses this connector
question
H.323 Gateway
answer
This element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols
question
PCI DSS
answer
Security standard that protects credit card data and transactions, requiring network segmentation as part of security controls
question
False
answer
Only Class B and Class C networks can be subnetted
question
True
answer
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system
question
True
answer
Cipher locks are not designed for physical security, such as on an outside door
question
Data Link Connection Identifier
answer
When using frame relay, this is the name of the identifier that routers use to determine which circuit to send frames to
question
False
answer
TCP is preferred over UDP for real time services
question
SS7
answer
On circuit switched portions of a PSTN, this set of standards established by the ITU are used to handle call signaling
question
In-Band
answer
Telnet and SSH are known as this type of management system
question
True
answer
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console
question
False
answer
T-1 cables cannot utilize straight through cables using the same wiring scheme as LAN patch cables
question
CSU/DSU
answer
The DTE or endpoint device for a leased line is known as this
question
OC-48
answer
This OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises
question
You pay only for the bandwidth you've used
answer
An advantage of leasing a frame relay circuit over leasing a dedicated circuit
question
Hot Site
answer
A type of recovery site where computers, devices, and connectivity necessary to build a network exist, and all are appropriately configured, updated, and connected to match your network's current state
question
Increase Performance
answer
This is not a valid reason for using virtualization
question
44.736 MB/s
answer
Maximum throughput of a DS3 connection
question
Public Relations Specialist
answer
This team member role, if necessary, learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties
question
79%
answer
Percentage of internet traffic that will be devoted to video traffic by 2018
question
Router
answer
This device is used to allow communication between VLANs for exchange of data
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New