CIS 175 Week 11 Final Exam • Question 1 2 out of 2 points The image below is an example of what type of WAN connection? Answer Selected Answer:
... [Show More] Dedicated leased line Correct Answer: Dedicated leased line • Question 2 0 out of 2 points The image below is an example of what type of WAN connection? Answer Selected Answer: ISDN Network, Packet-Switched Connection Correct Answer: Frame Relay Network, Packet-Switched Connection • Question 3 2 out of 2 points Which of the following is a common Layer 2 protocol that could run over a dedicated leased line? Answer Selected Answer: Point-to-Point Protocol (PPP) Correct Answer: Point-to-Point Protocol (PPP) • Question 4 2 out of 2 points If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link? Answer Selected Answer: 155.52 Mbps Correct Answer: 155.52 Mbps • Question 5 0 out of 2 points MPLS inserts a 32-bit header between Layer 2 and Layer 3 headers. Because this header is ________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a(an) ________ header. Answer Selected Answer: inserted, insert Correct Answer: shimmed, shim • Question 6 2 out of 2 points Which of the following is a type of coaxial cable? (Choose 2) Answer Selected Answers: 10 Base 2 10 Base 5 Correct Answers: 10 Base 2 10 Base 5 • Question 7 2 out of 2 points The data rates for T3 link is ________. Answer Selected Answer: 44.736 Mbps Correct Answer: 44.736 Mbps • Question 8 2 out of 2 points WLAN security based on a PSK technology is called ________ mode. Answer Selected Answer: personal Correct Answer: personal • Question 9 2 out of 2 points To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except: Answer Selected Answer: Enabling SSID broadcast Correct Answer: Enabling SSID broadcast • Question 10 2 out of 2 points WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________. Answer Selected Answer: IBSS, BSS, ESS Correct Answer: IBSS, BSS, ESS • Question 11 2 out of 2 points When a wireless channel uses more than one frequency the transmission method called ________ spectrum. Answer Selected Answer: Spread Correct Answer: Spread • Question 12 2 out of 2 points Which of the following is NOT a variation of spread-spectrum technology? Answer Selected Answer: DFSS Correct Answer: DFSS • Question 13 0 out of 2 points Which of the following wireless standards operate at a Maximum Bandwidth of less than 20Mbps? Answer Selected Answer: 802.11g Correct Answer: 802.11 • Question 14 2 out of 2 points Which of the following is NOT a WLAN security standard? Answer Selected Answer: WAP Correct Answer: WAP • Question 15 2 out of 2 points The availability of a network increases as the ________ of the network devices decreases and as ________ increases. Therefore, selecting reliable networking devices that are quick to repair is crucial to a high-availability design. Answer Selected Answer: MTTR, MTBF Correct Answer: MTTR, MTBF • Question 16 2 out of 2 points The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? Answer Selected Answer: Redundant Network with No Single Point of Failure Correct Answer: Redundant Network with No Single Point of Failure • Question 17 2 out of 2 points In network high availability measurement, what is the meaning of five nines? Answer Selected Answer: Means the network should be 999,999 percent uptime Correct Answer: Means the network should be 999,999 percent uptime • Question 18 2 out of 2 points What is the effective bandwidth in the WAN diagram below? Answer Selected Answer: 256 kbps Correct Answer: 256 kbps • Question 19 2 out of 2 points The ________ command can be used to display IP address configuration parameters on a Windows PC. Additionally, if the PC uses Dynamic Host Configuration Protocol (DHCP), the ________ command can be used to release and renew a DHCP lease, which is often useful when troubleshooting IP address problems in networks. Answer Selected Answer: ipconfig Correct Answer: ipconfig • Question 20 2 out of 2 points The ________ command can display a PC's current IP routing table. Answer Selected Answer: route Correct Answer: route • Question 21 2 out of 2 points Which of the following is NOT a UNIX CLI command? Answer Selected Answer: tracert Correct Answer: tracert • Question 22 2 out of 2 points Which command is a UNIX command? Answer Selected Answer: traceroute Correct Answer: traceroute • Question 23 2 out of 2 points The ________ command can be used to resolve an FQDN to an IP address. Answer Selected Answer: nslookup Correct Answer: nslookup • Question 24 2 out of 2 points The ________ command can be used to see what a Layer 2 MAC address corresponds to a known Layer 3 IP address. Answer Selected Answer: ARP Correct Answer: ARP • Question 25 2 out of 2 points The ________ command can similarly be used to resolve FQDNs to IP addresses.. Answer Selected Answer: dig Correct Answer: dig • Question 26 2 out of 2 points Which UNIX ARP option below is use to display current ARP entries in a UNIX Hosts' ARP table? Answer Selected Answer: -a Correct Answer: -a • Question 27 2 out of 2 points The ________ command pings every router hop from the source to the destination and reports the round-trip time for each router hop. Answer Selected Answer: tracert Correct Answer: tracert • Question 28 2 out of 2 points What does the acronym PPDIOO stand for? Answer Selected Answer: Prepare, plan, design, implement, operate, optimize Correct Answer: Prepare, plan, design, implement, operate, optimize • Question 29 2 out of 2 points Which of the following is one of the three broad categories of SNMP message types? Answer Selected Answer: SNMP GET, SNMP SET, SNMP Trap Correct Answer: SNMP GET, SNMP SET, SNMP Trap • Question 30 2 out of 2 points A Protocol Analyzer is also known as a ________. Answer Selected Answer: Network Sniffer Correct Answer: Network Sniffer • Question 31 2 out of 2 points When working with copper cabling (as opposed to fiber optic) a ________ can check a variety of a cable's electrical characteristics. Answer Selected Answer: Multimeter Correct Answer: Multimeter • Question 32 2 out of 2 points Which of the devices shown is a Throughput Tester? Answer Selected Answer: A Correct Answer: A • Question 33 2 out of 2 points What kind of information would you find in an Application Log? Answer Selected Answer: Information about software running on the OS Correct Answer: Information about software running on the OS • Question 34 2 out of 2 points What does a Throughput Tester do? Answer Selected Answer: Observes how a network performs under a heavy load Correct Answer: Observes how a network performs under a heavy load • Question 35 2 out of 2 points Which of the following is an example of symmetric encryption? (Choose 2) Answer Selected Answers: Advanced Encryption Standard (AES) Triple Data encryption Standard (3DES) Correct Answers: Advanced Encryption Standard (AES) Triple Data encryption Standard (3DES) • Question 36 2 out of 2 points What type of availability attack is described in the diagram below? Answer Selected Answer: TCP SYN Flood Correct Answer: TCP SYN Flood • Question 37 2 out of 2 points What are the three types of malicious traffic detection methods? Answer Selected Answer: Signature, policy, and anomaly based Correct Answer: Signature, policy, and anomaly based • Question 38 2 out of 2 points What are the three primary goals of network security? Answer Selected Answer: Integrity, confidentiality, availability Correct Answer: Integrity, confidentiality, availability • Question 39 2 out of 2 points Which of the following is a network vulnerability scanner? (Choose 2) Answer Selected Answers: Nessus Nmap Correct Answers: Nessus Nmap • Question 40 2 out of 2 points Which of the following is a firewall device type? (Choose 2) Answer Selected Answers: Software firewall Hardware firewall Correct Answers: Software firewall Hardware firewall • Question 41 2 out of 2 points ________ are rules, typically applied to router interfaces, that specify permitted and denied traffic. Answer Selected Answer: Access control lists Correct Answer: Access control lists • Question 42 2 out of 2 points What is the administrative distance of Open Shortest Path First (OSFP) routing protocol? Answer Selected Answer: 110 Correct Answer: 110 • Question 43 2 out of 2 points ________ can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection. Answer Selected Answer: Crosstalk Correct Answer: Crosstalk • Question 44 2 out of 2 points Which of the following is a common wireless network troubleshooting issue? (Choose 2) Answer Selected Answers: Radio Frequency Interference (RFI) Multiple paths of propagation Correct Answers: Radio Frequency Interference (RFI) Multiple paths of propagation • Question 45 2 out of 2 points What is the administrative distance of internal Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocol? Answer Selected Answer: 90 Correct Answer: 90 • Question 46 2 out of 2 points Consider the network diagram presented below, let's assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps. Let's also assume the switches do not support MDIX. Refer to the network diagram. What should be done to solve the problem of no communication? Answer Selected Answer: Replace the straight-through Cat 6 cable between SW1 and SW2 with a crossover Cat 6 cable. Correct Answer: Replace the straight-through Cat 6 cable between SW1 and SW2 with a crossover Cat 6 cable. • Question 47 2 out of 2 points Look at the topology shown below. What should be done to solve the problem of the channels interfering with each other? Answer Selected Answer: Assign AP-2 to channel 6 providing 5 channels of separation. Correct Answer: Assign AP-2 to channel 6 providing 5 channels of separation. • Question 48 0 out of 2 points Consider the network diagram presented below, let's assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps. Let's also assume the switches do not support MDIX. Refer to the network diagram. Identify what the Layer 1 issue would be in this topology. Answer Selected Answer: This network topology is fine and should work with no problems. Correct Answer: No communication is possible. • Question 49 0 out of 2 points Which of the following is a common OSI Layer 3 (network layer) troubleshooting issue? (Choose 2) Answer Selected Answers: Mismatched Maximum Transmission Unit (MTU) Crosstalk Correct Answers: Mismatched Maximum Transmission Unit (MTU) Incorrect subnet mask • Question 50 2 out of 2 points Which of the following is a common OSI Layer 1 (physical layer) troubleshooting issue? (Choose 2) Answer Selected Answers: Bad cables or connectors dB loss Correct Answers: Bad cables or connectors dB loss [Show Less]