100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Network+ (6th ed) Final Exam Practice Questions with Answers Correct!!

Rating
-
Sold
-
Pages
22
Grade
A
Uploaded on
27-05-2025
Written in
2024/2025

Which tools are tunneling protocols? PPTP and L2TP OpenVPN and IPsec IPSec and Radius HTTP and HTTPS - ANSWERSPPTP and L2TP A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network is commonly called a(n) __________ connection. host-to-site open virtual routed - ANSWERShost-to-site Which tool can be used to identify the location of a cable break in a copper cable? cable tester certifier time domain reflectometer optical time domain reflectometer - ANSWERStime domain reflectometer Which document is arguably the most famous of all security policies as this is one document that pretty much everyone who works for any organization is required to read, and in many cases sign, before they can start work? material safeties data sheet (MSDS) forensics report acceptable use policy (AUP) exit plan - ANSWERSacceptable use policy (AUP) Generally, what do software as a service (SaaS) providers charge you for? security what you use subscriptions time - ANSWERSsubscriptions Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks? Aircrack-ng Armitage Kali Linux OpenVAS - ANSWERSAircrack-ng Which command can be used on a Windows computer to view the IP settings? ip ss ipconfig ifconfig - ANSWERSipconfig What is an advantage of fiber-optic cabling? signals travel more slowly easier and cheaper to install than UTP greater maximum distance susceptible to electrical interference - ANSWERSgreater maximum distance Which component houses network engineers and technicians who maintain the applications housed in the data center, such as databases, Web servers, and so forth? main distribution frame (MDF) power distribution unit (PDU) intermediate distribution frame (IDF) network operations center (NOC) - ANSWERSnetwork operations center (NOC) Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems? 2427 and 2727 5004 and 5005 5030 and 5031 5060 and 5061 - ANSWERS5060 and 5061 Which term refers to a single computer under the control of an operator? DDoS smurf attack phishing zombie - ANSWERSzombie Which value of the ECN field indicates "QoS aware, no congestion"? 00 10 11 20 - ANSWERS10 Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet? peer-to-peer dial-up client/server virtual private network (VPN) - ANSWERSvirtual private network (VPN) Which term represents a measurement of how well a wireless device is connecting to other devices? mode signal strength link state access - ANSWERSsignal strength The physical location where connections come in from the outside world is known as the ____________________. telecommunications room (TCR) customer premises equipment (CPE) demarcation point (demarc) power distribution unit (PDU) - ANSWERSdemarcation point (demarc) Which service is considered to be the middle of the service-layer cake? platform as a service (PaaS) desktop as a service (DaaS) software as a service (SaaS) infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS) Which tool is an installed on the system in lieu of an operating system? infrastructure as a service Type 2 hypervisor infrastructure as code Type 1 hypervisor - ANSWERSType 1 hypervisor Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools? rootkit worm macro Trojan horse - ANSWERSrootkit Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack? DDoS smurf attack phishing DHCP snooping - ANSWERSDDoS Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process? broadcast connection-oriented connectionless multicast - ANSWERSconnection-oriented What type of unit is formed by two or more wireless nodes communicating in ad hoc mode? basic service set (BSS) basic service set identifier (BSSID) independent basic service set (IBSS) extended service set (ESS) - ANSWERSindependent basic service set (IBSS) Virtualization usually refers to running software on a computer to create a _________________, an environment that imitates a physical machine. host server terminal emulator virtual machine hard disk - ANSWERSvirtual machine

Show more Read less
Institution
Network+
Course
Network+










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Network+
Course
Network+

Document information

Uploaded on
May 27, 2025
Number of pages
22
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Network+ (6th ed) Final Exam Practice
Questions with Answers Correct!!
Which tools are tunneling protocols?

PPTP and L2TP
OpenVPN and IPsec
IPSec and Radius
HTTP and HTTPS - ANSWERSPPTP and L2TP

A type of VPN connection where a single computer logs into a remote network and
becomes, for all intents and purposes, a member of that network is commonly called
a(n) __________ connection.

host-to-site
open
virtual
routed - ANSWERShost-to-site

Which tool can be used to identify the location of a cable break in a copper cable?

cable tester
certifier
time domain reflectometer
optical time domain reflectometer - ANSWERStime domain reflectometer

Which document is arguably the most famous of all security policies as this is one
document that pretty much everyone who works for any organization is required to read,
and in many cases sign, before they can start work?

material safeties data sheet (MSDS)
forensics report
acceptable use policy (AUP)
exit plan - ANSWERSacceptable use policy (AUP)

,Generally, what do software as a service (SaaS) providers charge you for?

security
what you use
subscriptions
time - ANSWERSsubscriptions

Which tool is an open-source tool for penetration testing pretty much every aspect of
wireless networks?

Aircrack-ng
Armitage
Kali Linux
OpenVAS - ANSWERSAircrack-ng

Which command can be used on a Windows computer to view the IP settings?

ip
ss
ipconfig
ifconfig - ANSWERSipconfig

What is an advantage of fiber-optic cabling?

signals travel more slowly
easier and cheaper to install than UTP
greater maximum distance
susceptible to electrical interference - ANSWERSgreater maximum distance

Which component houses network engineers and technicians who maintain the
applications housed in the data center, such as databases, Web servers, and so forth?

main distribution frame (MDF)
power distribution unit (PDU)
intermediate distribution frame (IDF)
network operations center (NOC) - ANSWERSnetwork operations center (NOC)

Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems?

2427 and 2727
5004 and 5005
5030 and 5031
5060 and 5061 - ANSWERS5060 and 5061

Which term refers to a single computer under the control of an operator?

, DDoS
smurf attack
phishing
zombie - ANSWERSzombie

Which value of the ECN field indicates "QoS aware, no congestion"?

00
10
11
20 - ANSWERS10

Which type of network is created when you use encrypted tunnels between a computer
or a remote network and a private network through the Internet?

peer-to-peer
dial-up
client/server
virtual private network (VPN) - ANSWERSvirtual private network (VPN)

Which term represents a measurement of how well a wireless device is connecting to
other devices?

mode
signal strength
link state
access - ANSWERSsignal strength

The physical location where connections come in from the outside world is known as
the ____________________.

telecommunications room (TCR)
customer premises equipment (CPE)
demarcation point (demarc)
power distribution unit (PDU) - ANSWERSdemarcation point (demarc)

Which service is considered to be the middle of the service-layer cake?

platform as a service (PaaS)
desktop as a service (DaaS)
software as a service (SaaS)
infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS)

Which tool is an installed on the system in lieu of an operating system?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bestgrades2 West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
23
Member since
1 year
Number of followers
0
Documents
4063
Last sold
2 months ago

4.0

3 reviews

5
1
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions