cnt 115 answers.docx
TRANSCRIPT
-
8/14/2019 CNT 115 Answers.docx
1/23
Expand AllCollapse All
..Course Menu:Network+ (ITNW1458.20101122.257400)
Announcements .Instructor .Messaging --------------------------------------------------------------------------------
.Syllabus .Lessons .Web Based Labs .Presentations .Book Ch 1-6 .Quizzes & Exams.Discussion Board
--------------------------------------------------------------------------------
.Tools .Communications .Plagarism .Non Course Links .Evaluation .Review Test Submission:Final Exam.ContentUser Lucas Schwartz
Submitted 2/2/11 7:27 PM
Name Final Exam
Status Completed
Score 226 out of 300 points
Time Elapsed 57 minutes, and 55 seconds out of 2 hours.
Instructions
Question 1 .2 out of 2 points
____ is a social engineering practice in which a person attempts to glean access orauthentication information by posing as someone who needs that information.Answer
Correct Answer:
Phishing
. Question 2 .2 out of 2 points
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have____ names.Answer
Correct Answer:
duplicate
. Question 3 .2 out of 2 points
A computer programmed to act like an IP telephone is known as a(n) ____.Answer
Correct Answer: softphone
. Question 4 .2 out of 2 points
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as amore sophisticated alternative to ____.Answer
Correct Answer:
-
8/14/2019 CNT 115 Answers.docx
2/23
POP3
. Question 5 .2 out of 2 points
____ software searches a node for open ports.Answer
Correct Answer: Port scanner
. Question 6 .0 out of 2 points
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.Answer
Correct Answer:
call signaling and control
. Question 7 .0 out of 2 points
All VoIP calls are carried over the Internet.Answer
Correct Answer: False
. Question 8 .2 out of 2 points
____ describes the use of any network to carry voice signals using the TCP/IP
protocol.Answer
Correct Answer:
IP telephony
. Question 9 .0 out of 2 points
____ is a method of encrypting TCP/IP transmissions.Answer
Correct Answer:
SSL
. Question 10 .0 out of 2 points
The combination of a public key and a private key is known as a ____.Answer
Correct Answer: key pair
. Question 11 .2 out of 2 points
A patch is a replacement for an entire software package.Answer
Correct Answer: False
-
8/14/2019 CNT 115 Answers.docx
3/23
. Question 12 .2 out of 2 points
____ is the use of one network to simultaneously carry voice, video, and datacommunications.Answer
Correct Answer: Convergence
. Question 13 .2 out of 2 points
A ____ main function is to examine packets and determine where to direct them based ontheir Network layer addressing information.Answer
Correct Answer:
routers
. Question 14 .0 out of 2 points
The process of reverting to a previous version of software after attempting to upgrade it isknown as ____.Answer
Correct Answer:
backleveling
. Question 15 .2 out of 2 points
A ____ is a document (preferably online) that lists every service and software packagesupported within an organization, plus the names of first- and second-level support contacts for
those services or software packages.Answer Correct Answer:
supported services list
. Question 16 .2 out of 2 points
Network security is more often compromised from the inside thanfrom externalsources.Answer
Correct Answer: True
. Question 17 .2 out of 2 points
A ____ is a program that runs automatically, without requiring a person to start or stopit.Answer
Correct Answer:
bot
-
8/14/2019 CNT 115 Answers.docx
4/23
. Question 18 .2 out of 2 points
Some software errors point to a physical connectivity problem.Answer
Correct Answer: True
. Question 19 .0 out of 2 points
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and
every word in a dictionary to gain access to the network.Answer
Correct Answer:
dictionary
. Question 20 .2 out of 2 points
____ management refers to the detection and signaling of device, link, or componentfaults.Answer
Correct Answer:
Fault
. Question 21 .2 out of 2 points
A(n) ____ virus changes its characteristics every time it is transferred to a newsystem.Answer
Correct Answer:
polymorphic
. Question 22 .0 out of 2 points
Above all, keep ____ in mind when you upgrade or install hardware on a network.Answer
Correct Answer:
safety
. Question 23 .2 out of 2 points
Protection against harmful code involves more than just installing anti-malware
software.Answer
Correct Answer: True
. Question 24 .2 out of 2 points
____ are programs that run independently and travel between computers and across
networks.Answer
-
8/14/2019 CNT 115 Answers.docx
5/23
Correct Answer:
Worms
. Question 25 .2 out of 2 points
SMTP operates from port ____.Answer Correct Answer:
25
. Question 26 .2 out of 2 points
The support and use of multiple processors to handle multiple threads is known as____.Answer
Correct Answer:
multiprocessing
. Question 27 .2 out of 2 points
When a caller uses an IP telephone, his or her voice is immediately digitized and issued fromthe telephone to the network in ____ form.Answer
Correct Answer:
packet
. Question 28 .0 out of 2 points
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an
IPv4 address contain network information.Answer Correct Answer:
1
. Question 29 .2 out of 2 points
The directory containing information about objects in a domain resides on computers called____ controllers.Answer
Correct Answer:
domain
. Question 30 .2 out of 2 points
____ is a public key encryption system that can verify the authenticity of an e-mail sender andencrypt e-mail data in transmission.Answer
Correct Answer:
PGP
-
8/14/2019 CNT 115 Answers.docx
6/23
. Question 31 .2 out of 2 points
A ____ is a network device devoted to storage and delivery of frequently requested
files.Answer
Correct Answer:
cache engine
. Question 32 .2 out of 2 points
The primary function of the UNIX ____ is to coordinate access to all your computershardware, such as the disks, memory, keyboard, and monitor.Answer
Correct Answer:
kernel
. Question 33 .2 out of 2 points
A(n) ____ is a password-protected and encrypted file that holds an individuals identificationinformation, including a public key.Answer
Correct Answer:
digital certificate
. Question 34 .0 out of 2 points
A ____ attack occurs when a hacker tries numerous possible character combinations to find
the key that will decrypt encrypted data.Answer
Correct Answer:
brute force
. Question 35 .2 out of 2 points
A ____ firewall is a router (or a computer installed with software that enables it to act as a
router) that examines the header of every packet of data it receives to determine whether that
type of packet is authorized to continue to its destination.Answer
Correct Answer:
packet-filtering
. Question 36 .0 out of 2 points
In classful addressing, Class C IPv4 address host information is located in the ____.Answer
Correct Answer:
last 8 bits
. Question 37 .2 out of 2 points
-
8/14/2019 CNT 115 Answers.docx
7/23
____is the local storage of frequently needed files that would otherwise be obtained from an
external source.Answer
Correct Answer:
Caching
. Question 38 .2 out of 2 points
____ is a fundamental property of wire that depends on a wires molecular structure and
size.Answer
Correct Answer:
Resistance
. Question 39 .2 out of 2 points
____ protocols are the rules that computers follow to accomplish authentication.Answer
Correct Answer:
Authentication
. Question 40 .2 out of 2 points
An off-the-shelf workstation can be programmed to act like an IP telephone.Answer
Correct Answer: True
. Question 41 .2 out of 2 points
A ____ is a correction, improvement, or enhancement to a particular piece of a softwareapplication.Answer
Correct Answer:
patch
. Question 42 .2 out of 2 points
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs,enables administrators to manage files, users, groups, security, printers, and so on.Answer
Correct Answer:
GUI
. Question 43 .2 out of 2 points
IP telephones are directly connected to the local loop.Answer
Correct Answer: False
-
8/14/2019 CNT 115 Answers.docx
8/23
-
8/14/2019 CNT 115 Answers.docx
9/23
110
. Question 51 .2 out of 2 points
A workgroup is a group of interconnected computers that share each others resources without
relying on a central ____.Answer Correct Answer:
server
. Question 52 .2 out of 2 points
Resistance is measured in ____.Answer
Correct Answer:
ohms
. Question 53 .2 out of 2 points
A network management agent is a ____ that collects information about a devices operationand provides it to the network management application.Answer
Correct Answer:
software routine
. Question 54 .2 out of 2 points
A program that disguises itself as something useful but actually harms your system is called a
____.Answer
Correct Answer: Trojan horse
. Question 55 .2 out of 2 points
The process where one network management console collects data from multiple networked
devices at regular intervals is known as ____.Answer
Correct Answer:
polling
. Question 56 .2 out of 2 points
____ is a type of media capable of storing digitized data and that uses a laser to write data to it
and read data from it.Answer
Correct Answer:
Optical media
. Question 57 .2 out of 2 points
-
8/14/2019 CNT 115 Answers.docx
10/23
A key component in managing networks is identifying and tracking its hardware and softwarethrough ____ management.Answer
Correct Answer:
asset
. Question 58 .2 out of 2 points
When used on a copper-based cable, a continuity tester applies a small amount of ____ toeach conductor at one end of the cable.Answer
Correct Answer:
voltage
. Question 59 .0 out of 2 points
____ is a specialized storage device or group of storage devices that provides centralizedfault-tolerant data storage for a network.Answer
Correct Answer:
NAS
. Question 60 .2 out of 2 points
Every UNIX and Linux system contains full documentation of UNIX commands in the ____pages.Answer
Correct Answer:
man
. Question 61 .2 out of 2 points
A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista,Server 2003, and Server 2008.Answer
Correct Answer:
pathping
. Question 62 .2 out of 2 points
____ is a measure of how well a network service matches its expected performance.Answer
Correct Answer:
QoS
. Question 63 .2 out of 2 points
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery,while providing power to a network device through its battery.Answer
-
8/14/2019 CNT 115 Answers.docx
11/23
Correct Answer:
online
. Question 64 .0 out of 2 points
____ are often considered third-level support.Answer Correct Answer:
Help desk coordinators
. Question 65 .2 out of 2 points
In ____ addressing, only Class A, Class B, and Class C addresses are recognized.Answer
Correct Answer:
classful
. Question 66 .0 out of 2 points
Among all video-over-IP applications, ____ is perhaps the simplest.Answer
Correct Answer:
streaming video
. Question 67 .2 out of 2 points
An example of a popular mail server is ____.Answer
Correct Answer:
Microsoft Exchange Server
. Question 68 .0 out of 2 points
IMAP4 servers require less storage space and usually more processing resources than POPservers do.Answer
Correct Answer: False
. Question 69 .2 out of 2 points
In CIDR, conventional network class distinctions do not exist.Answer
Correct Answer: True
. Question 70 .2 out of 2 points
The most comprehensive and complex upgrade involving network hardware is a(n) ____upgrade.Answer
-
8/14/2019 CNT 115 Answers.docx
12/23
Correct Answer:
backbone
. Question 71 .0 out of 2 points
A(n) ____ is a graphical representation of a networks devices andconnections.Answer Correct Answer:
network diagram
. Question 72 .2 out of 2 points
The more data you gather while establishing your networks baseline, the less accurate yourprediction will be.Answer
Correct Answer: False
. Question 73 .2 out of 2 points
____ are often considered first-level support.Answer
Correct Answer:
Help desk analysts
. Question 74 .0 out of 2 points
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range ofservices known as ____.Answer
Correct Answer: video over IP
. Question 75 .0 out of 2 points
____ management is the collection, storage, and assessment of information related to theversions of software installed on every network device and every devices hardware
configuration.Answer
Correct Answer:
Configuration
. Question 76 .2 out of 2 points
The use of certificate authorities to associate public keys with certain users is known as____.Answer
Correct Answer:
PKI
-
8/14/2019 CNT 115 Answers.docx
13/23
. Question 77 .2 out of 2 points
A(n) ____ is a list that organizes resources and associates them with their
characteristics.Answer
Correct Answer:
directory
. Question 78 .2 out of 2 points
Because backbone upgrades are expensive and time consuming, the first step in approachingsuch a project is to ____ it.Answer
Correct Answer:
justify
. Question 79 .2 out of 2 points
A benefit to using an NTFS partition is that it can be read by older operating systems, such asWindows 95, Windows 2000 Professional, and early versions of UNIX.Answer
Correct Answer: False
. Question 80 .2 out of 2 points
In a ____ attack, a person redirects or captures secure transmissions as they occur.Answer
Correct Answer:
man-in-the-middle
. Question 81 .2 out of 2 points
____ involves manipulating certain characteristics of packets, data streams, or connections to
manage the type and amount of traffic traversing a network or interface at any moment.Answer
Correct Answer:
Traffic shaping
. Question 82 .2 out of 2 points
Using VoIP over a WAN allows an organization to avoid paying long-distance telephonecharges, a benefit known as ____.Answer
Correct Answer:
toll bypass
. Question 83 .2 out of 2 points
-
8/14/2019 CNT 115 Answers.docx
14/23
Human errors, ignorance, and omissions cause more than half of all security breaches
sustained by networks.Answer
Correct Answer: True
. Question 84 .2 out of 2 points
____ is one of the most important functions an NOS provides.Answer
Correct Answer:
Client support
. Question 85 .2 out of 2 points
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.Answer
Correct Answer:
concentrator
. Question 86 .2 out of 2 points
Tone generators and tone locators are used to determine characteristics about a cable.Answer
Correct Answer: False
. Question 87 .0 out of 2 points
The standard message format specified by SMTP allows for lines that contain no more than
____ ASCII characters.Answer Correct Answer:
1000
. Question 88 .2 out of 2 points
UNIX was one of the first operating systems to implement a ____ file system.Answer
Correct Answer:
hierarchical
. Question 89 .2 out of 2 points
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital
voice signals.Answer
Correct Answer:
IP-PBX
. Question 90 .2 out of 2 points
-
8/14/2019 CNT 115 Answers.docx
15/23
Active Directory organizes multiple domains hierarchically in a domain ____.Answer
Correct Answer:
tree
. Question 91 .2 out of 2 points
A ____ is a software-based tool that continually monitors network traffic from a server orworkstation attached to the network.Answer
Correct Answer:
network monitor
. Question 92 .2 out of 2 points
notation takes the form of the network ID followed by a(n) ____, followed by the number ofbits that are used for the extended network prefix.Answer
Correct Answer:
forward slash ( / )
. Question 93 .2 out of 2 points
____ messaging is a service that makes several forms of communication available from asingle user interface.Answer
Correct Answer:
Unified
. Question 94 .2 out of 2 points
____ signaling functions are more limited than those performed by the protocols in the H.323group.Answer
Correct Answer:
SIP
. Question 95 .0 out of 2 points
A(n) ____ is a deviation from a specified level of system performance for a given period oftime.Answer
Correct Answer:
failure
. Question 96 .0 out of 2 points
The core of all UNIX and Linux systems is called the kernel.Answer
-
8/14/2019 CNT 115 Answers.docx
16/23
Correct Answer: True
. Question 97 .2 out of 2 points
Solaris employs the file system called ____ for its native file system type.Answer
Correct Answer: UFS
. Question 98 .2 out of 2 points
Most wireless testing tools contain more powerful antennas than a workstation NIC.Answer
Correct Answer: True
. Question 99 .2 out of 2 points
SIP and H.323 account for communication between media gateways.Answer
Correct Answer: False
. Question 100 .0 out of 2 points
By default, the 802.11 standard offers substantial security.Answer
Correct Answer: False
. Question 101 .2 out of 2 points
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used
for host information in an IPv4 address.Answer
Correct Answer:
reserved
. Question 102 .2 out of 2 points
____ are frames that are not actually data frames, but aberrations caused by a device
misinterpreting stray voltage on the wire.Answer Correct Answer:
Ghosts
. Question 103 .0 out of 2 points
A router that is not configured to drop packets that match certain suspicious characteristics isan example of a risk associated with ____.Answer
-
8/14/2019 CNT 115 Answers.docx
17/23
Correct Answer:
transmission and hardware
. Question 104 .0 out of 2 points
An administrator can discover the host name assigned to a client by using the ____utility.Answer
Correct Answer:
hostname
. Question 105 .0 out of 2 points
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.Answer
Correct Answer:
bridge
. Question 106 .2 out of 2 points
____ is intended to eliminate single points of failure.Answer
Correct Answer:
Redundancy
. Question 107 .0 out of 2 points
____ upgrades represent modifications to all or part of an application that are designed to
enhance functionality or fix problems related to software.Answer Correct Answer:
Application
. Question 108 .2 out of 2 points
A(n) ____ is a computer that manages multiple media gateways.Answer
Correct Answer:
MGC
. Question 109 .2 out of 2 points
____ is the telltale factor for ascertaining where faults in a cable lie.Answer
Correct Answer:
Impedance
. Question 110 .2 out of 2 points
-
8/14/2019 CNT 115 Answers.docx
18/23
The term ____ memory refers to the RAM chips that are installed on the computers system
board and whose sole function is to provide memory to that machine.Answer
Correct Answer:
physical
. Question 111 .2 out of 2 points
Encryption is the last means of defense against data theft.Answer
Correct Answer: True
. Question 112 .2 out of 2 points
Mesh topologies and ____ topologies are good choices for highly available enterprise
networks.Answer
Correct Answer:
SONET rings
. Question 113 .2 out of 2 points
A ____ usually results from a bad NIC.Answer
Correct Answer:
jabber
. Question 114 .2 out of 2 points
In a ____ cable, the transmit and receive wire pairs in one of the connectors arereversed.Answer
Correct Answer:
crossover
. Question 115 .0 out of 2 points
For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefullydocument the existing cable after making any upgrades.Answer
Correct Answer: False
. Question 116 .2 out of 2 points
A(n) ____ is a self-contained, well-defined task within a process.Answer
Correct Answer:
thread
-
8/14/2019 CNT 115 Answers.docx
19/23
. Question 117 .2 out of 2 points
Documenting and capturing an accurate picture of a networks physical and logical elements
are initial steps in understanding the network.Answer
Correct Answer: True
. Question 118 .2 out of 2 points
A ____ attack occurs when a system becomes unable to function because it has been delugedwith data transmissions or otherwise disrupted.Answer
Correct Answer:
denial-of-service
. Question 119 .2 out of 2 points
____ is preferred over TCP for real-time applications such as telephone conversations andvideoconferencing.Answer
Correct Answer:
UDP
. Question 120 .0 out of 2 points
____ scanning techniques attempt to identify malware by discovering malware-like
behavior.Answer
Correct Answer:
Heuristic
. Question 121 .2 out of 2 points
A ____ can be used to intercept a telephone conversation.Answer
Correct Answer:
butt set
. Question 122 .0 out of 2 points
A____ is a small electronic device that issues a signal on a wire pair.Answer Correct Answer:
tone generator
. Question 123 .0 out of 2 points
The ____ utility allows you to view a hosts routing table.Answer
Correct Answer:
-
8/14/2019 CNT 115 Answers.docx
20/23
route
. Question 124 .0 out of 2 points
The result from ANDing 11001111 with 10010001 is ____.Answer
Correct Answer: 10000001
. Question 125 .2 out of 2 points
In ____, both computers verify the credentials of the other.Answer
Correct Answer:
mutual authentication
. Question 126 .0 out of 2 points
Power that is free from noise is called ____ power.Answer
Correct Answer:
clean
. Question 127 .2 out of 2 points
Continuity testers can test only copper cable.Answer
Correct Answer: False
. Question 128 .2 out of 2 points
____ detects malware by comparing current characteristics of files and disks against an
archived version of these characteristics to discover any changes.Answer
Correct Answer:
Integrity checking
. Question 129 .2 out of 2 points
Within a classful addressing, ____ is the default subnet mask for a Class C address.Answer
Correct Answer: 255.255.255.0
. Question 130 .0 out of 2 points
In classful addressing, the Class B IPv4 address network ID is located in the ____.Answer
Correct Answer:
first 16 bits
-
8/14/2019 CNT 115 Answers.docx
21/23
. Question 131 .0 out of 2 points
Many streaming video services - and nearly all of those issued over a public network, such asthe Internet - are examples of ____ transmissions.Answer
Correct Answer: unicast
. Question 132 .0 out of 2 points
A ____ is a major change to a software packages existing code.Answer
Correct Answer:
software upgrade
. Question 133 .0 out of 2 points
A networked ____ is perhaps the simplest device to add.Answer
Correct Answer:
workstation
. Question 134 .2 out of 2 points
On a network using TCP/IP, some nodes may use multiple IP addresses.Answer
Correct Answer: True
. Question 135 .2 out of 2 points
____ provides redundancy through a process called disk mirroring.Answer
Correct Answer:
RAID Level 1
. Question 136 .2 out of 2 points
Naming (or addressing) conventions in Active Directory are based on the ____ namingconventions.Answer
Correct Answer: LDAP
. Question 137 .2 out of 2 points
The gateways that make up the Internet backbone are called ____ gateways.Answer
Correct Answer:
core
-
8/14/2019 CNT 115 Answers.docx
22/23
. Question 138 .2 out of 2 points
An example of a popular client email software is ____.Answer
Correct Answer:
Microsoft Outlook
. Question 139 .2 out of 2 points
Logical connectivity problems often prove more difficult to isolate and resolve than physicalconnectivity problems.Answer
Correct Answer: True
. Question 140 .2 out of 2 points
Before using a network monitor or protocol analyzer on a network, it is important to knowwhat ____ on your network normally looks like.Answer
Correct Answer:
traffic
. Question 141 .2 out of 2 points
It is more difficult to transmit VoIP and video over IP signals over a packet-switched networkthan it is to transmit data signals.Answer
Correct Answer: True
. Question 142 .0 out of 2 points
The goal of fault-tolerant systems is to prevent failures from progressing to faults.Answer
Correct Answer: False
. Question 143 .2 out of 2 points
A security policy should state exactly which hardware, software, architecture, or protocolswill be used to ensure security.Answer
Correct Answer: False
. Question 144 .2 out of 2 points
A(n) ____ is a graphical representation of a networks wired infrastructure.Answer
-
8/14/2019 CNT 115 Answers.docx
23/23
Correct Answer:
wiring schematic
. Question 145 .2 out of 2 points
____ management refers to monitoring how well links and devices are keeping up with thedemands placed on them.Answer
Correct Answer:
Performance
. Question 146 .2 out of 2 points
____ scanning detects malware by comparing a files content with known malware signaturesin a signature database.Answer
Correct Answer:
Signature
. Question 147 .2 out of 2 points
Many network engineers consider ____ to be superior to MGCP.Answer
Correct Answer:
MEGACO
. Question 148 .2 out of 2 points
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the
file must be archived.Answer Correct Answer:
bit
. Question 149 .2 out of 2 points
RADIUS and TACACS belong to a category of protocols known as AAA (____).Answer
Correct Answer:
authentication, authorization, and accounting
. Question 150 .2 out of 2 points
POP3s design makes it best suited to users who retrieve their mail from the same workstationall the time.Answer
Correct Answer: True