25 questions
Which encryption protocol does GRE use to increase the security of its transmissions?
a. SSL
b. SFTP
c. IPsec
d. SSH
When using public and private keys to connect to an SSH server, where must your public key be placed?
a. In the authorized keys file under your home directory on your computer.
b. In the authorized keys file on the host where the SSH server is.
c. In the /etc/ssh/keys folder.
d. In the /var/run/ssh/public folder.
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
a. VMware vSphere
b. Oracle VirtualBox
c. Parallels
d. Citrix Xen
In public key encryption, which key is used to decrypt the message?
a. Session key
b. Private key
c. Public key
d. Network key
A hacker runs a program that tries numerous character combinations until it stumbles
on the correct combination and cracks the key. What offensive strategy is this program
using?
a. Brute force attack
b. Zero-day exploit
c. CIA triad
d. Endpoint security vulnerability
What kind of firewall blocks traffic based on application data contained within the
packets?
a. Host-based firewall
b. Content-filtering firewall
c. Packet-filtering firewall
d. Stateless firewall
What kind of vulnerability is exploited by a ping of death?
a. Zero-day exploit
b. Buffer overflow
c. Social engineering
d. Backdoor
8) At what layer of the OSI model do proxy servers operate?
a. Layer 3
b. Layer 2
c. Layer 7
d. Layer 4
9) An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
a. buffer overflow
b. session hijacking attack
c. man-in-the-middle attack
d. banner-grabbing attack
Packets that are smaller than a medium's minimum packet size are known by what term below?
a. jabbers
b. giants
c. ghosts
d. runts
You’re trying to choose a signaling protocol for your company’s network because
you’re about to upgrade to a VoIP system. You need to keep it simple because this is a
small company with a simple network. Which protocol should you choose?
a. H.323
b. SIP
c. MGCP
d. Megaco
Which QoS technique operates at the OSI layer “2.5”?
a. RTP
b. DiffServ
c. MPLS
d. CoS
Your roommate has been hogging the bandwidth on your router lately. What technique
can you use to limit the amount of bandwidth his computer can utilize at any one time?
a. Interface reset
b. Packet shaping
c. Caching
d. Traffic policing
What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
a. proxy server
b. registrar server
c. user agent server
d. redirect server
Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
a. H.323 terminal
b. H.323 gateway
c. H.323 gatekeeper
d. MCU
What is the formula for determining the number of possible hosts on a network?
a. 2n = Y
b. 2n – 2 = Y
c. 2h = Z
d. 2h – 2 = Z
With which network connection type does the VM obtain IP addressing information
from its host?
a. Bridged mode
b. Managed mode
c. NAT mode
d. Host-only mode
A network with 6 bits remaining for the host portion will have how many usable hosts?
a.254
b.126
c.62
d.30
To connect to a network, a virtual machine requires a ____.
a. virtual switch
b. virtual adapter
c. physical switch
d. virtual MAC address
Which protocol assigns a virtual IP to a group of routers?
a. VTP
b. VRRP
c. SDN
d. STP
What technology allows a user to access the Internet through the wiring of a home?
a. Ethernet over HDMI
b. Broadband over power line
c. Ethernet over power line
d. Ethernet over SONET
Which WAN topology always sends data directly from its origin to its destination?
a. Bus topology
b. Ring topology
c. Star topology
d. Mesh topology
What IEEE committee established WiMAX technologies?
a. 802.11
b. 802.3
c. 802.5
d. 802.16
Which option below is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?
a. You are guaranteed to receive the maximum amount of bandwidth specified in the circuit contract
b. You pay only for the bandwidth you've used.
c. The paths that your data will take are always known.
d. Frame relay is a newly established network technology with more features than other technology.
Which communications provide start and stop bits for each character transmitted?
a. SONET
b. Metro Ethernet
c. ATM
d. MPLS