convergence - Answer The time it takes for all the routing tables on every router in a
network to be fully updated, either when a change occurs or according to a schedule, is
called the speed of what?
a. convergence
b. concurrence
c. congestion
d. delivery
MAC address - Answer Each interface on a router must have an IP address and what
else to be able to communicate on the network?
a. serial number
b. network ID
c. default gateway
d. MAC address
wardriver - Answer What type of hacker uses a scanning device to find unsecured
wireless networks and break into those networks?
a. white hat
b. wardriver
c. script kiddy
d. phisher
preboot execution environment - Answer Which advanced feature of a NIC allows a
computer to download an OS from the network instead of from a local drive?
a. shared system memory
b. onboard coprocessor
c. advanced configuration power management
interface
d. preboot execution environment
Honeypot - Answer What type of device should you install as a decoy to lure potential
attackers?
a. VPN
b. Trojan
c. IPS
d. honeypot
encryption - Answer Which facet of securing access to network data makes data
unusable to anyone except authorized users?
a. security devices
b. malware protection
c. encryption
d. authentication
, preshared key - Answer Which form of authentication involves the exchange of a
password-like key that must be entered on both devices?
a. GNU privacy guard
b. preshared key
c. digital certificate
d. Kerberos authentication
port scanner - Answer Which of the following is a tool used to determine what possible
points of entry exist that are open and vulnerable on your system?
a. protocol finder
b. ping scanner
c. trace route
d. port scanner
shared bandwidth - Answer You are a network architect for an IT consulting company.
One of your clients needs a WAN connection and has asked you about the
disadvantage of a packet-switched WAN method. Which of the following is a
disadvantage that applies?
a. low bandwidth
b. suspect reliability
c. expensive compared to leased lines
d. shared bandwidth
T1 uses point to point, while frame relay makes use of virtual circuits. - Answer Although
a frame relay connection is established in much the same way that a T1 connection is,
which of the following is an important distinction between the two technologies?
a. T1 uses point to point, while frame relay makes
use of virtual circuits.
b. T1 data traffic must all be transmitted in clear
text, while frame relay encrypts data
automatically and is more secure.
c. T1 connections are established using
CSU/DSUs. Frame relay connections require
a VPN service on the remote node.
d. Frame relay is point to point, whereas T1 uses
virtual circuits.
Time Division Multiplexing (TDM) - Answer What is the signaling method used to
allocate time slots for each channel in a T-carrier line called?
a. Time Fractionalized Division (TFD)
b. Time Divided Multimixing (TDM)
c. Time Division Multiplexing (TDM)
d. Time Slotted Modulation (TSM)