Monday, May 20, 2019

Linux Security Final Review

Allows the connection of hub to hub or switch without having to use a special cable 2. Which selective information speed and maximum cable duration is not employ for Category e/6 cabling? Anything different than mezzo/mobcaps (Caste) and up to mezzo, class E/mobcaps, Gossips but at a distance less than cytosine meters (Cat) both up to 100 meters. (Page 59. ) 3. What do the associate blowzys on a hub or switch introduce? That the transmit and receive pairs are properly aligned and the connected devices are communicating . 4. What does the link light on a NICE present?Connectivity to the network. 5. What is an echo request relative to computer networking? It Is part of the IGMP protocol that requests a reply from a computer. (Page 40) 6. What Is the command used on a PC to display the mack address? Upcoming/ only 7. What is the command used on a Linux machine to display the IP address? Facing 8. What is the maximum length of a horizontal cable run that still allows for the len gth of the patch cables and extra cabling on each end? 90 meters 9. A data problem is describe to the network administrator. The problem Is found to be tit the HTTP network connection.What would the network administrator do to perform apart the problem. Test the link, perform a traceries command, depends on what type of problem is occurring with the cabling. 10. Describes interconnection of Lana within a especial(a) geographic subject area. MAN (Metropolitan Area Network) (page 5) 1 1 . Which describes an Ethernet governing body operating at 100 Mbps? strong Ethernet or Bassett (page 32) 12. What is another term for network congestion? Bottleneck (page 59) 13. A network address of 192. 168. 6. 0 and a subnet mask of 255. 255. 254. 0 can be Ritter In CIDER as? 92. 168. 168. 0/3 (page 180) 14. The three packets exchanged at the beginning of a TCP connection between two ports are SYNC, SYNC*JACK, & JACK (page 1 59) 15. IP addresses are assigned by which of the pastime? ARIN (Am erican Registry for net income Numbers (page 173) 16. The connection to a routers console port input is typically which of the following? RSI-232 serial communications port using an RAJA-45 lack to connect to Its Interface (page 201 ) 17. What is the help command In the CISCO ISO? ? is the global help command (page 207) 18.AAU stands for Attachment unit Interface (page 141) 19. The router interface most commonly used to link Lana to a campus network Is Fast Ethernet (Chapter 9) 20. Serial Interfaces on a router are typically used to used to interface to other serial devices (page 214) 21 . Clocking on the serial port of a router is set at the DATE end False, it is DCE (page 215) 22. The purpose of a gateway is to allow data to enter and live a LANA. True (page 145) 23. The command for saving the routers running-configuration to non-volatile memory Is copy run start page 235) 24.The administrative distance of a static route is 1 (page 246) 25. EIGRP is classified as which of the following link-state protocol (page 257) 26. What area ID should be used for the Network backbone? Area O (page 251) 27. What does OSPF use to verify that two router links are communicating? Hello Packets (page 251 ) 28. Which file allocation table system Is best for very full-grown multi gigabit drives today? NETS (New Technology File System (page 1 1 5) 29. Which of the following bus types 1 stumble roving similar services including server functions identifies which type of network?Peer-to-peer (page 510) 31 . Dynamically assigns IP addresses to machines as needed DDCD Server (page 513) 32. A red x on a users account in Windows 2003/2000 indicates which of the following The user is locked out for having too many login attempt failures (page 553) 33. This server is used to service information requests from clients. procurator Server (page 513) 34. Computer Viruses and Worms cause all of the following except Virus causes annoyance, clogging up the put up server, denial of reviv e, data loss, open holes for others to access your machine.Worms attack computers and can deny service to networks, they establish a back gate in the infected computer enabling an attacker to access someones computer (page 393) 35. state of war Driving is a term used to describe someone driving with an antenna out the door of a vehicle, connected to a mobile device running Windows or Linux (page 394) 36. A true Firewall entrance fee Control List is used to Access list can be configured on a router, on a true dedicated firewall, or on the host computer (page 396) 37. AnIntrusion Detection system is designed to look for (Select 2) looks for signatures and probing (page 404) 38. Telephony identifies which of the following technologies? Poi ( vox over P) (page 488) 39. Which of the following have the greatest radio set data rate? 802. 1 In provides rates over 200+ Mbps (page 420) 40. What are the two wedlock American and International optical standards? (Select two) SONNET (Synchro nous Optical network and SAD (Synchronous Digital Hierarchy) (page 468) 41 . What is the meaning of the 2-Deep rule?That the dissemination in a building should only have he main distribution and the intermediate distribution that feeds the horizontal distribution to the work area (page 472) 42. True or False Voice Over IP and Telephony are synonymous with each other. True (page 488) 43. Which Poi protocol provides for end-to-end capture communications by requiring user authentication SIP (Secure Session Initiation Protocol) (page 489) 44. The following are all So concerns for Poi except These are concerns Jitter, Network latency and packet loss, & Queuing (page 495) 45.Using Linux, the command that lists the basic files in a rectory is Is (page 565) 46. Using Linux, the command that deletes a files is arm (page 571) 47. To display the previously entered commands stored in the Linux history fan you would use history (page 583) 48. Using Linux, the command that is similar to the f ind or search command in Windows is Greg (page 585) 49. The three major differences between industrial and commercial networks are Hierarchy, Redundancy, & Determinism (page 619) 50. The Ethernet protocol developed for large industrial use is Ethernet/IP or UDP or TCP (page 629)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.