networking final

sha256sum

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

What is the purpose of the checksum TCP field?

trunk port

An interface that manages traffic from multiple VLANs is known by what term?

logic bomb

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

They do not forward broadcast traffic.

How do routers create a broadcast domain boundary?

Protected EAP (PEAP)

Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?

Differentiated Services (DiffServ)

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

1022

A network with 10 bits remaining for the host portion will have how many usable host addresses?

runts

Packets that are smaller than a medium's minimum packet size are known by what term below?

127.0.0.1

Which of the following IP addresses would be a loopback IP address?

link local address

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

mtr

What utility is the equivalent to the pathping command on a Linux system?

deauthenitication attack

What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?

802.1Q

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

Only one root port, which is the bridge's port that is closest to the root bridge, can forward.

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?

tailgating

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

dig @8.8.8.8 mycompany.com MX

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

10.3.0.0/19

You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal?

jabber

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

ipconfig /flushdns

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

BPDU guard

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

expedited forwarding

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

What is routing protocol convergence time defined as?

It used a shared encryption key for all clients, and the key might never change.

The Wired Equivalent Privacy standard had what significant disadvantage?

gpedit.msc

The Group Policy utility can be opened by typing what name into a Run box?

flow label

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

port 547

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

EIGRP may not be available on non-Cisco routers.

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

ipconfig /all

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

VLAN 1001

When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?

link-state protocols

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

Priority Code Point (PCP)

What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?

1522 bytes

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.

Which of the following scenarios represents a phishing attempt?

It identifies the e-mail server to be used for e-mail traffic for the domain.

What does the MX record do in a forward DNS zone?

A denial-of-service attack prevents legitimate users from accessing normal network resources.

What statement regarding denial-of-service (DoS) attacks is accurate?

netstat -n

What command will list only current connections, including IP addresses and port numbers?

99.999%

A highly available server is available what percentage of the time?

EIGRP

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

VNC is open source, allowing companies to develop their own software based on VNC

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

fail-open

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

Jitter is what happens when packets experience varying amounts of delay and arrive out of order.

What statement correctly describes "jitter"?

request for proposal

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase?

The signal is split into secondary waves that continue in the direction in which they split.

Diffraction has what affect on a wireless signal's propagation?

Active Directory Domain Services (AD DS)

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

9 kHz and 300 GHz

The wireless spectrum, as defined by the FCC, spans between which two frequencies?

The amount of available bandwidth.

With a SIP trunk, what is the only limitation on the number of calls that can run at any one time?

IaaS

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

10 volts

What is the minimal amount of voltage required to damage an electrical component?

The exposure of the cable can cause transmission interference between wires.

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?

Switches determine the optimal path between sender and receiver, and then establish the path before transmission.

On an ATM network, how is the path that data will take determined?

64 Kbps

A fractional T1's bandwidth can be leased multiples of what data rate?

The sequence control field indicates how packets will be subdivided.

How does the 802.11 data frame indicate how a large packet should be fragmented?

basic service set

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?

master license agreement

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?

Physical layer

At what layer of the OSI model do the 802.11 standards vary?

Occupational Safety and Health Administration (OSHA)

What federal agency is charged with safety and health in the workplace?

In an authorization file on the host where the SSH server is.

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?

A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

What statement accurately describes what a cable bend radius determines?