Network+ Ch 7-9 Study Guide

9 September 2022
4.7 (114 reviews)
50 test answers

Unlock all answers in this set

Unlock answers (46)
question
Type 2 hypervisor
answer
VMware Player and Linux KVM are both examples of what type of hypervisor?
question
OpenVPN
answer
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
question
virtual switch
answer
A is a logically defined device that operates at the Data Link layer to pass frames between the nodes
question
False
answer
VMs that must be available at a specific address, such as mail servers or Web servers, should be assigned host-only network connections.
question
host-only
answer
In which networking mode, can VMs on one host exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host?
question
LAAS
answer
In which cloud computing service model are hardware services provided virtually, including network infrastructure devices such as virtual servers?
question
Public
answer
Which of the following cloud deployment models would the Internet be considered as an example?
question
asymmetric
answer
Because public key encryption requires the use of two different keys, it is also known as which type of encryption?
question
digital certificate
answer
Which of the following terms best describe a small file containing verified identification information about the user and the user's public key
question
handshake
answer
Which type of protocol allows the client and server to introduce themselves to each other and establish terms for how they will exchange data?
question
False
answer
SSH provides little security for establishing a connection and no security for transmitting data.
question
PPTP
answer
Which of the following is an older, Layer 2 protocol developed by Microsoft that encapsulates VPN data frames?
question
True
answer
A network administrator might separate traffic in order to enhance security.
question
Forward slash()
answer
CIDR notation takes the network ID or a host's IP address and follows it with a symbol followed by the number of bits used for the network ID. Which symbol is used?
question
DHCP relay agent
answer
A centrally managed DHCP server can provide DHCP assignments to multiple subnets with the help of which of the following?
question
True
answer
Subnet masks are only used in IPv4 classful addressing.
question
True
answer
There are no IPv6 equivalents to IPv4's Class A, Class B, or Class C networks
question
True
answer
A VLAN groups ports on a Layer 2 switch so that some of the local traffic on the switch is forced to go through a router.
question
Tag
answer
To identify the transmissions that belong to each VLAN, the switch adds which of the following to Ethernet frames?
question
False
answer
An unmanaged switch can be configured via a command-line interface or a web-based GUI.
question
native LAN
answer
Which of the following types of VLANs receives all untagged frames from untagged ports?
question
802.1
answer
Which IEEE standard specifies how VLAN information appears in frames and how switches interpret that information
question
exploit
answer
The act of taking advantage of a vulnerability is known as which of the following?
question
phishing attack
answer
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
question
man-in-the-middle attack
answer
Which of the following describes an attack where a person redirects and captures secure transmissions as they occur?
question
trojan horse
answer
A program that disguises itself as something useful but actually harms your system is known as which of the following?
question
Unauthenticated
answer
In which type of vulnerability scan does the attacker begin on the perimeter of the network, looking for vulnerabilities that do not require trusted user privileges?
question
proximity card
answer
Which of the following access control methods does not require direct contact with a proximity reader in order to be detected?
question
tamper detection sensor
answer
Which of the following detection methods can detect physical penetration, temperature extremes, input voltage variations, or certain kinds of radiation?
question
discovery
answer
what is the first phase of properly managing and applying security patches?
question
hashing
answer
What term best describes the process of transforming data through an algorithm that generally reduces the amount of space needed for data?
question
True
answer
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models
question
False
answer
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
question
True
answer
PPP can support several types of Network layer protocols that might use the connection.
question
True
answer
A community cloud is a service shared between multiple organizations, but not available publicly
question
False
answer
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
question
False
answer
Office 365 is an example of a SaaS implementation with a subscription model
question
True
answer
Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA).
question
False
answer
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
question
False
answer
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
question
True
answer
The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.
question
Iaas
answer
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
question
SaaS
answer
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
question
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
answer
what type of scenario would be best served by using a Platform as a Service (PaaS) cloud model
question
In an authorization file on the host where the SSH server is
answer
When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?
question
key pair
answer
The combination of a public key and a private key are known by what term below?
question
IPsec
answer
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission
question
Network Layer
answer
At what layer of the OSI model does the IPsec encryption protocol operate?
question
FCS
answer
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
question
VPN gateway
answer
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?