CSIS 330 Final Exam

CSIS 330 Final Exam Liberty University

Set 1

  1. Intermediary devices direct the path of the data as well as change the data content.
  2. Which of the following is a type of media used to interconnect devices and to provide the pathway over which data can be transmitted?
  3. is an emerging trend for home networking that uses existing electrical wiring to connect devices and includes the concept of “no new wires”.
  4. Which of the following is a network security component for a home or small office network?
  5. involves increased priority for production control or business transaction data.
  6. Which of the following type of networks is often set up by individuals who work from a home or remote office and need to connect to a corporate network or other centralized resource?
  7. According to the textbook, the pace at which the development of exciting new converged network applications is occurring can be attributed to the rapid growth and expansion of
  8. One way to accomplish the required QoS by managing the delay and packet loss parameters on a network can be accomplished through
  9. What key is used to return to the EXEC prompt at the –More—prompt?
  10. To exit interface configuration mode and return to privileged EXEC mode, what command(s) should be entered at the prompt?
  11. According to the textbook, while all devices come with a default IOS and feature set, it is possible to upgrade the IOS version or feature set to obtain additional capabilities.
  12. What command must be entered to configure an IP address of 192.168.10.3 and subnet mask of 255.255.255.0 for a switch?
  13. What command is used to access the privileged EXEC mode from the user EXEC mode?
  14. A(n) _______________ secures outgoing traffic and restricts incoming traffic
  15. The portion of the OS that interfaces with the applications and user is known as the
  16. Which of the following prompts indicates that the user is in Privileged EXEC mode?
  17. is the physical address for the network interface of either the next-hop router or the network interface of the destination device.
  18. When a host sends messages using a one-to-many delivery option, it is known as a
  19. The process of placing one message format inside another message format is called
  20. The ___________ model is the most widely known internetwork reference model.
  21. A _________________________ consists of the media that provide the pathway over which a message travels from source to destination.
  22. is the physical address of the device that is sending a packet.
  23. What is the decimal equivalent of the binary number 01010101?
  24. What is the hexadecimal equivalent of the decimal number 248?
  25. What is the hexadecimal equivalent of the binary number 00011111?
  26. What is the binary equivalent of the decimal number 93?
  27. What is the decimal equivalent of the hexadecimal number F1?
  28. What is the hexadecimal equivalent of the binary number 11000111?
  29. is the capacity of a medium to carry data.
  30. The color coding for UTP cabling is:
  31. The __________________ layer produces the representation and grouping of bits as voltages, radio frequencies, or light pulses.
  32. The _______ layer accepts a complete frame from the data link layer and encodes it as a series of signals that are transmitted onto the local media.
  33. What are the contents of the data field in a frame?
  34. Which of the following is not a characteristic of Cat6 cable?
  35. is the amount of time, including delays, for data to travel from one given point to another.
  36. Which of the following is not a characteristic of contention-based access?
  37. In 1998, the IEEE 802.3ac standard extended the maximum allowable frame size to be 1522 bytes in order to accommodate a technology called
  38. The MAC address on a host does not change.
  39. In ___________________ buffering, frames are stored in queues that are linked to specific incoming and outgoing ports.
  40. is a logical interface on a Cisco device associated with a bundle of routed ports.
  41. is a physical port on a Layer 3 switch configured to act as a router port.
  42. The ______________ sublayer of the data link layer is responsible for the placement of frames on the media and the removal of frames from the media.
  43. Cisco routers use ROM to store which of the following?
  44. Which of the following is not a true statement regarding an IPv4 Header in the network layer of the OSI model?
  45. The version field in an IPv4 header contains a 4-bit binary value identifying the IP packet version. For IPv4 packets, this field is always set to
  46. Which of the following statements are major issues with IPv4?
  47. Which of the following is not displayed by the IOS show version command on a router?
  48. NVRAM is used by Cisco IOS as permanent storage for which of the following?
  49. The default route is only used when a host must forward packets to a remote network.
  50. Which field in a router’s routing table identifies the IP address of the next router to forward a packet?
  51. Which of the following is true of the TCP three-way handshake?
  52. Without segmentation, only one application would be able to receive data.
  53. UDP is known as __________________ delivery because there is no acknowledgement that the data is received at the destination.
  54. Which of the following types of ports use numbers 0 to 1023?
  55. What is the advantage that UDP has over TCP?
  56. The __________ represents the starting value for the bytes for a session that are transmitted to the receiving application. As data are transmitted during the session, this number is incremented by the number of bytes that have been transmitted.
  57. Starting with a sequence number of 2000, if 5 segments of 1000 bytes each were received, an ACK number of ________ would be returned to the source.
  58. Which port is assigned to HTTPS?
  59. ISPs that are large national or international and are directly connected to the Internet backbone are members of what Tier?
  60. The address block for legacy Class A networks included the range
  61. Unlike IPv4, in IPv6, the all-0s address can be assigned to a device. However, the all-0s address is reserved as a Subnet-Router anycast address and should be assigned only to routers.
  62. IPv6 address are ______ bits in length and written as a string of hexadecimal values. 1 out of 1 points
  63. Like IPv4, IPv6 uses both the prefix length and the dotted-decimal subnet mask notation for indicate the network portion of an IPv6 address.
  64. What type of IPv6 addresses are in the range FE80::/10?
  65. The address of the last usable host in a network is always 1 less than the network address.
  66. Typically, it is the global unicast address of the router and not the link-local address that is used as the default gateway for other devices on the link.
  67. In subnetting, for each bit borrowed from the host portion of a network address, the number of subnetworks available
  68. How many valid host addresses are created when 4 host bits are borrowed from the 10.20.20.0/24 network?
  69. The terms subnet and network are often used interchangeably.
  70. Using an IPv4 network address of 192.168.2.0/26, what is the broadcast address in the first subnet (i.e. subnet[0])?
  71. Traffic cannot be forwarded between subnets without the use of a router.
  72. How many usable hosts per sub-network will you have using a /17 address?
  73. Using an IPv4 network address of 192.168.2.0/26, what is the subnetwork address in the second subnet (i.e. subnet[1])?
  74. Using an IPv4 network address of 192.168.2.0/26, how many usable hosts per subnet are possible?
  75. What is the IPv6 DHCP message that corresponds to the IPv4 DHCPOFFER message?
  76. What TCP/IP layer supports the exchange of data between programs running on the source and destination hosts?
  77. After a client has a leased IPv4 address from a DHCP server, it can be renewed prior to the lease expiration through another DHCPDISCOVER message.
  78. The automatic assignment of IP addresses, subnet masks, gateways, and other IP networking parameters is called _________________ addressing.
  79. Which protocol resolves Internet names to IP addresses?
  80. Which DHCP message is a reply with an offer of a lease to the client?
  81. DHCP enables clients on a network to do which of the following?
  82. Which of the following is false with respect to FTP?
  83. Which of the following is an example of a strong password?
  84. Which feature of network security determines which resources a user can access and which operations the user is allowed to perform?
  85. A(n) __________ firewall is a firewall that is built into a dedicated hardware device known as a security appliance.
  86. Intruders who gain access by modifying software or exploiting software vulnerabilities are often called
  87. A firewall is one of the most effective security tools available for protecting internal network users from external threats.
  88. Which of the following firewall techniques prevents or allows access to websites based on specific URLs or keywords?
  89. attacks are the disabling or corruption of networks, systems, or services.
  90. Which of the following elements are not considered when scaling a network?
  91. A DDoS attack differs from a regular DoS attack in that the victim is attacked in a coordinated manner from several compromised systems known as
  92. How is “extended ping” entered on a Cisco router?
  93. What type of network vulnerability is involved with the lack of a disaster recovery plan?
  94. Which of the following is not a type of access attack?
  95. VoIP uses voice-enabled routers that convert analog voice from traditional telephone signals into IP packets.
  96. Which of the following protocols support delay-sensitive delivery to support streaming media?
  97. An attacker runs a ping sweep against a network. What type of attack is this?
  98. Which feature of network security requires that users and administrators must prove that they are who they say they are?
  99. firewalls reside on host computers and are not designed for LAN implementations.
  100. Making illegal online purchases is what type of security threat?

Set 2

  1. An organization can use a(n) ________________ to provide secure and safe access to individuals who work for a different organization, but require company data.
  2. Which of the following is not a benefit of a connection-oriented system, like a circuit-switched telephone system?
  3. __________ are computer hosts that have software installed that enable them to request and display the information obtains from a server.
  4. Which of the following is not a specific feature of a WAN?
  5. _________________________ identify devices, ports, and IP addressing schemes.
  6. The Internet is a conglomerate of networks and is owned by the United States.
  7. __________________________ involves increased priority for production control or business transaction data.
  8. Traditional learning methods provide which two sources of expertise from which the student can obtain information?
  9. A(n) ____________ forwards data packets to and receives data packets from the Internet
  10. Which mode is used to configure one of the physical or virtual lines?
  11. ____________________ is a method for remotely establishing a CLI session of a device, through a virtual interface, over a network.
  12. What command is used on a Windows PC at the command prompt to display the computer’s IP configuration setttings?
  13. According to the textbook, when a banner is used on an IOS device, it should always welcome someone to the device as its first statement.
  14. What CLI shortcut completes the remainder of a partially typed command or keyword?
  15. The Delete key (the key normally used to erase characters to the right of the cursor) is not recognized by terminal emulation programs.
  16. What type of connection to a Cisco IOS switch is used to make the initial configuration?
  17. Which protocol receives message segments from the transport layer, packages them into packets, and addresses them for end-to-end delivery over an internetwork?
  18. The TCP/IP protocol suite does not specify which protocols to use when transmitting over a physical medium.
  19. The ___________ model is the most widely known internetwork reference model.
  20. _______________________ is the term used to refer to the PDU at the Transport layer of the TCP/IP model.
  21. A group of inter-related protocols necessary to perform a communication function is called a(n) ____________.
  22. ___________ is the process used by a receiving device to remove one or more of the protocol headers.
  23. Is the binary number 10101011 odd or even?
  24. What is the binary equivalent of the decimal number 119?
  25. What is the binary equivalent of the hexadecimal number AA?
  26. What is the decimal equivalent of the binary number 01000000?
  27. What is the binary equivalent of the decimal number 65?
  28. What is the decimal equivalent of the hexadecimal number A0?
  29. Bits are encoded on fiber as ___________________________.
  30. What type of connector is used to terminate UTP cables?
  31. The _________________ layer controls how data is transmitted onto the physical media by encoding the binary digits that represent data into signals.
  32. _________________________ is a transmission technique in which the amplitude of the carrier varies in accordance with the signal.
  33. ______________ stipulates the commercial cabling standards for LAN installations and is the standard most commonly used in LAN cabling environments.
  34. ____________________________ is popular in long-distance situations spanning hundreds of kilometers such as required in long-haul telephony and cable TV applications.
  35. A(n) _______________ transmission of data exists when data signals are sent along with a clock signal that occurs at evenly spaced time durations.
  36. What type of connector is usually used to terminate a UTP cable?
  37. _________ is a logical interface on a switch associated with a virtual local-area network (VLAN).
  38. A _______________________ MAC address is the unique address used when a frame is sent from a single transmitting device to a single destination device.
  39. Which of the following is not a function of data encapsulation in Ethernet?
  40. In ________________ switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete.
  41. In ________________ switching, the switch stores the first 64 bytes of the frame before forwarding.
  42. In ________________ switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received.
  43. The maximum size of a PDU that a medium can transport is known as the _______________________.
  44. Which of the following is not displayed by the IOS show version command on a router?
  45. Which of the following statements is false with respect to IP?
  46. Which of the following is not a column in an IPv6 Route Table?
  47. Which field in a router’s routing table identifies the IP address of the next router to forward a packet?
  48. The local routing table of a host typically contains a route to the loopback interface (127.0.0.1).  This address is known as a ______________________.
  49. Which of the following is not an advantage of the IPv6 simplified header over the IPv4 header?
  50. In what part of a router is the current configuration being used located?
  51. TCP breaks up a message into small pieces known as ______.
  52. Which of the following is not a characteristic of TCP?
  53. Which port is assigned to HTTP?
  54. Which of the following is not a common transport layer protocol?
  55. What range of ports can either be used by TCP to identify the requested service on the destination device or as a client source port?
  56. If a client sends an ISN of 2 to a server, and a server responds with an ISN of 1 to the client, what is the final stage of the TCP three-way handshake?
  57. Which of the following is not a protocol that uses TCP to ensure data delivery?
  58. Regulating the amount of data a source transmits is a function of _____________.
  59. A _______________ is 32-bits long, and it signifies which part of an IP address is network and which part is host.
  60. Both IPv4 and IPv6 use an ICMP protocol as the principal means to verify connectivity.
  61. The default subnet mask for a Class B address is _____________.
  62. What is the process in generating an IPv6 interface ID that uses a client’s 48-bit Ethernet MAC address and inserts another 16 bits in the middle of the 48-bit MAC address to create a 64-bit interface ID?
  63. ____________________ is a representation of information using only 1s and 0s.
  64. On a host device, which Windows command can be used to view the IP address information assigned by a DHCP server?
  65. Which of the following IPv4 addresses would be used in a private network?
  66. A(n) ________________ IPv6 address is an all-0s address represented as ::/128, or just :: in the compressed format.
  67. With VLSM, the subnet mask will vary depending on how many bits have been borrowed for a particular subnet.
  68. You have been assigned an IP address for your network of 192.168.1.0 / 24.  Each subnet needs to accommodate 12 hosts.  What is the subnet mask?
  69. What is the network address for the host assigned to 172.16.4.35/24 ?
  70. What is the first step in planning network subnets?
  71. How many hosts per network can you have with a subnet mask of 255.255.192.0?
  72. IPv4 subnets are created by using one or more of the ____________ bits as ____________ bits.
  73. Why were variable-length subnet masks created?
  74. You are given an IPv4 network address of 192.168.10.0/24 by your ISP.  You need to subnet this network.  You know that the subnet mask will be 255.255.255.252. Therefore, how many bits have you borrowed from the host portion of the network address to achieve this subnet mask?
  75. Which of the following is false with respect to Server Message Block (SMB)?
  76. In a __________________ network, two or more computers are connected through a network and can share resources without having a dedicated server.
  77. The type of addressing used when the network administrator manually enters IP address information on network hosts is called _________ addressing.
  78. Which protocol is used to assign an IP address, subnet mask, default gateway and DNS address to a host?
  79. Which protocol is a reliable, connection-oriented protocol used for interactive file transfer between systems?
  80. Which port(s) is(are) assigned to Telnet?
  81. Which of the following are functions of the Presentation Layer in the OSI model?
  82. Which DHCP message identifies the explicit server and lease offer that a client is accepting?
  83. Intruders who gain access by modifying software or exploiting software vulnerabilities are often called _______.
  84. A key network switch has failed because of excessive humidity.  What type of physical threat caused the problem?
  85. A firewall is one of the most effective security tools available for protecting internal network users from external threats.
  86. What is true of an application layer service?
  87. According to the textbook, real-time applications require more planning and dedicated services (relative to other types of data) to ensure priority delivery of voice and video traffic.
  88. What type of network vulnerability is involved with the mere use of HTTP, FTP, and ICMP?
  89. ___________________ attacks are the disabling or corruption of networks, systems, or services.
  90. Which network protocol should a network administrator use to remotely configure a network device?
  91. What is a network vulnerability?
  92. ____________________ helps to eliminate single points of failure in a network.
  93. What type of network vulnerability is involved when JavaScript is turned on in web browsers?
  94. Which of the following is not a type of access attack?
  95. A(n) __________ firewall is a firewall that is built into a dedicated hardware device known as a security appliance.
  96. Which of the following is an example of a strong password?
  97. An attacker runs a ping sweep against a network. What type of attack is this?
  98. Which feature of network security records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made?
  99. Which of the following firewall techniques prevents or allows access based on IP or MAC addresses?
  100. VoIP uses voice-enabled routers that convert analog voice from traditional telephone signals into IP packets.
$4.99
Add to Cart

has been added to your cart!

have been added to your cart!

Resume templates under $5, go to GoodResume.io