Shared Flashcard Set

Details

Palo Alto Fall Term 2
2nd half of the term
54
Computer Networking
Undergraduate 1
12/06/2020

Additional Computer Networking Flashcards

 


 

Cards

Term
The IoT refers to the network of physical smart, connected objects that are embedded with electronics, software, sensors, and network connectivity. T/F
Definition
True
Term
An autonomous system (AS) is a group of contiguous IP address ranges under the control of a single internet entity. Individual autonomous systems are assigned a 16-bit or 32-bit AS number (ASN) that uniquely identifies the network on the internet. ASNs are assigned by the Internet Assigned Numbers Authority (IANA). T/F
Definition
True
Term
Which DNS record type specifies authoritative information about a DNS zone such as a primary name server, email address of the domain administrator, and domain serial number?
CNAME (Canonical Name)
NS (Name Server)
PTR (Pointer)
SOA (Start for Authority)
Definition
SOA
Term
Which of the following are dynamic routing protocols? (Choose 4)
DHCP
Border Gateway Protocol(BGP)
Open Shortest Path First (OSPF)
Split Horizon
Routing Information Protocol (RIP)
EIGRP
Definition
BGP
OSPF
RIP
EIGRP
Term
Which protocol requires every router to calculate and maintain a complete map, or routing table, of the entire network?
Distance-vector
Static
Link State
Convergence
Definition
Link State
Term
This type of extranet will allow businesses within an industry to share information or integrate shared business processes.
Metropolitan Area Network (MAN)
Campus Area Network (CAN)
Value Add Network (VAN)
Storage Area Network (SAN)
Definition
VAN
Term
A domain name registrar is an organization that is accredited by a top-level domain (TLD)registry to manage domain name registrations. T/F
Definition
True
Term
HTTPS is an appplication protocol used to transfer clear text data between web servers and web browsers. T/F
Definition
False
Term
Select the appropriate slash notation for an IPv4 class C address.
/16
/24
/32
/8
Definition
/24
Term
Variable length subnet masking (VLSM) aggregates multiple continuous smaller networks into a larger network to enable more efficient internet routing. T/F
Definition
True
Term
Which option is an example of a logical address?
MAC address
IP address
Burned-In address
Physical address
Definition
IP address
Term
A default gateway is a network device, such as a router or switch, to which an endpoint sends network traffic when a specific destination IP address is not specified by an application or service, or when the endpoint does not know how to reach a specified destination. T/F
Definition
True
Term
Identify the broadcast address from the following:
214.19.21.255/14
192.168.12.127/25
192.168.0.255/16
10.24.36.48/28
Definition
192.168.12.127/25
Term
Select the subnet mask for a class A address.
255.255.255.0
255.255.0.0
255.0.0.0
255.255.255.255
Definition
255.0.0.0
Term
An IPv6 address is made up of how many bits?
48
256
32
128
64
Definition
128
Term
Which subnet is 172.168.33.20/20 on?
172.168.8.0
172.168.0.0
172.168.32.0
172.168.16.0
Definition
172.168.32.0
Term
Which subnetwork is 192.168.25.50/28 on?
192.168.0.0
192.168.25.64
192.168.25.48
192.168.25.0
Definition
192.168.25.48
Term
Select the appropriate 1st octet associated with an IPv4 class B address:
10
255
172
192
Definition
172
Term
Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?
de-encapsulation
packetization
PDU stripping
encapsulation
Definition
de-encapsulation
Term
At which OSI layer does the PDU contain sequence and acknowledgement numbers?
Application
Data Link
6
4
Definition
4
Term
The OSI Application layer manages encryption and formatting. T/F
Definition
False
Term
HTTP interacts with which OSI layer:
Physical
Session
Application
Data Link
Definition
Application
Term
Which layer of the OSI model does Project 802 divide into two sublayers?
Physical
Data Link
Session
Network
Definition
Data Link
Term
Which OSI layer determines the route a packet takes from sender to receiver?
3
7
4
1
Definition
3
Term
Which of the following problems can occur at the Physical layer?
Incorrect IP addresses
Signal errors caused by noise
NIC driver problems
Definition
Signal errors caused by noise
Term
Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?
3
2
6
5
Definition
5
Term
Which OSI layer handles flow control, data segmentation, and reliability?
Data link
Transport
Physical
Application
Definition
Transport
Term
At which Data Link sublayer does the physical address reside?
Network Access Control (NAC)
Media Access Control (MAC)
Logical Link Control (LLC)
Data Access Control (DAC)
Definition
MAC
Term
Which type of attach is specifically directed at senior executives or other high-profile targets within an organization through email that typically purports to be a legal subpoena, customer complaint, or other serious matter?
Whaling
Spear phishing
Watering hole
Pharming
Definition
Whaling
Term
New exploits can be crafted from any number of more than a thousand core exploit techniques. T/F
Definition
False
Term
Which type of advanced malware uses common techniques to hide certain binary strings that are characteristically used in malware and therefore are easily detected by anti-malware signature, or to hide an entire malware program.
Obfuscation
Metamorphism
Polymorphism
Multi-functionality
Definition
Obfuscation
Term
A vulnerability is a small piece of software code, part of a malformed data file, or a sequence (string) of commands created by an attacker to cause unintended or unanticipated behavior in a system or software. T/F
Definition
False
Term
Which option is an important characteristic or capability of advanced malware?
Multi-functionality
Hiding techniques such a polymorphism, metamorphism, and obfuscation
Distributed, fault tolerant architecture
All the above
Definition
All the above
Term
Which of these protocols is not used for VPNs?
ICMP
SSTP
WEP
L2TP
PPTP
Definition
WEP
Term
Which of the following is true about ISDN?
It uses a terminal adapter to connect to the network
It uses a modem to modulate/demodulate the signal
Its PRI format provides bandwidth up to 128 Kbps
Its BRI format consists of two B-channels and one D-channel
Definition
Its BRI format consists of two B-channels and one D-channel
Term
Which of the following combines several communication streams into a single faster communication stream?
DSU
Demultiplexing
Multiplexing
CSI
Definition
Multiplexing
Term
Which of the following places data on the local loop?
DTE
DCE
CPE
Router
Definition
DCE
Term
Which wireless WAN technology has a standard for fixed and mobile devices?
LTE
WiMAX
LTE-Advanced
Satellite
Definition
WiMAX
Term
Which technology uses 53-byte cells?
ATM
POTS
X.25
Frame relay
Definition
ATM
Term
Which of the following best describes a digital signal?
A signal that varies over time continually and smoothly
A signal whose states vary much like a lamp controlled by a dimmer switch
A series of binary values
A channel service unit
Definition
A series of binary values
Term
Which VPN mode should you use if you want to establish a secure tunnel between a main office and a branch office?
Client-to-gateway
Host to site
Site-to-site
Site to gateway
Definition
site-to-site
Term
Which procedure specifies what resources users can access and the tasks they can perform on a network?
Auditing
Authorization
Authentication
Logon
Definition
Authorization
Term
For what purpose is a CSU/DSU used?
Routes packets from the LAN to the WAN
Create a WAN connection over the public switched telephone network
Modulates a digital signal into an analog signal
Creates a digital connection between a LAN device and the WAN link
Definition
Creates a digital connection between a LAN device and the WAN link
Term
Which wireless WAN technology might not be suitable for voice applications because of latency?
LTE
WiMAX
LTE-Advanced
Satellite
Definition
Satellite
Term
Which of the following VPN protocols is commonly used for web based VPN connections?
SMTP
PPTP
SSL
L2TP
Definition
SSL
Term
Kerberos is a ticket-based authentication protocol in which "tickets" are used to identify network users. T/F
Definition
True
Term
Playbooks (or runbooks) are task-based graphic workflows that help visualize processes across security products. These playbooks can be fully automated, fully manual, or anywhere in between. T/F
Definition
True
Term
Which of the following is not found in the output of a successful ping reply?
The TTL of the reply packet
IP address of the responding computer
The number of bytes in the ICMP message
The sequence number
Definition
The sequence number
Term
Which TCP/IP layer conflicts are related to changes in encryption keys or updates to service architectures that are not supported by different client devices?
Session
Transport
Presentation
Application
Definition
Application
Term
A directory service is a database that contains information about users, resources, and services in a network. T/F
Definition
True
Term
Select the three pillars of security orchestration.
People, process, technology
Virtualization, storage, cloud
SaaS, IaaS, PaaS
Software, hardware, storage
Definition
People, process, technology
Term
Which command in Linux gives you extensive help on how to use a command?
guide
help
man
more
Definition
help
Term
A cloud access security broker (CASB) is software that monitors activity and enforces security policies on traffic between an organization's users and cloud-based applications and services. T/F
Definition
True
Term
Which problem-solving approach requires a solid understanding of how networks work?
Trial and error
Step by step with the OSI model
Solve by example
Replacement method
Definition
Step by step with the OSI model
Supporting users have an ad free experience!