Complete Solutions
________________ involves building up longer sequences of
automated steps.
A. Composition
B. Containerization
C. Orchestration
D. Virtualization Correct Answers Orchestration is a higher
level of automation that builds up longer sequences of tasks that
better map to what the organization or employees need to
accomplish.
7. Which of the following is a valid Class C IP address?
A. 50.50.50.50
B. 100.100.100.100
C. 192.168.0.254
D. 250.250.250.250 Correct Answers The address
192.168.0.254 falls within the range of Class C addresses
because it starts with an octet from 192 through 223.
802.1X is a great example of _______________.
A. encryption
B. content switching
C. port-based authentication
D. VLAN trunking Correct Answers 802.1X is port-based
authentication.
A computer compromised with malware to support a botnet is
called a _______________.
A. Zombie
,B. Reflection
C. DDoS
D. Locked node Correct Answers All of the compromised
systems on a botnet are called zombies.
A DoS attacker using __________ would focus on sending the
smallest amount of traffic possible.
A. Reflection
B. Inflection
C. Emanation
D. Amplification Correct Answers The goal of amplification is
to keep the targeted server as busy as possible.
A frame ends with a special bit called the frame check sequence
(FCS). What does the FCS do?
A. Cycles data across the network
B. Verifies that the MAC addresses are correct
C. Verifies that the data arrived correctly
D. Verifies that the IP address is correct Correct Answers
Verifies that the data arrived correctly; The data is followed by a
special bit of checking information called the frame check
sequence, which the receiving NIC uses to verify that the data
arrived correctly.
A hash function is by definition a _______________.
A. complex function
B. PKI function
C. one-way function
D. systematic function Correct Answers Hash functions must be
one-way. They should be complex, but complexity is
not a requirement.
,A MAC address is known as a(n) __________ address.
A. IP
B. logical
C. physical
D. OEM Correct Answers physical
A newly installed host uses what NDP control message type to
find available routers on the network?
A. Network advertisement
B. Network solicitation
C. Router advertisement
D. Router solicitation Correct Answers Hosts use router
solicitation messages to discover available routers.
A NIC sends data in discrete chunks called __________.
A. segments
B. sections
C. frames
D. layers Correct Answers frames; Data is sent in discrete
chunks called frames. Networks use frames to keep any one NIC
from hogging the wire.
A static VLAN assigns VLANs to _______________.
A. IP addresses
B. MAC addresses
C. ports
D. trunks Correct Answers Static VLANs assign VLANs to
physical ports.
A TLS URL connection starts with which prefix?
, A. http
B. www
C. ftp
D. https Correct Answers URLs (Uniform Resource Locators)
that use a TLS (Transport Layer Security) connection start with
https (Hypertext Transfer Protocol Secure) instead of http.
A user's machine is locked to a screen telling her she must call a
number to unlock her system. What kind of attack is this?
A. DDoS
B. Logic bomb
C. Ransomware
D. Session hijacking Correct Answers Ransomware attacks can
be brutal, demanding money to unlock your content.
A(n) _______________ cipher encrypts the plaintext one bit at a
time.
A. block
B. forwarding
C. stream
D. asymmetric Correct Answers A stream cipher encrypts one
bit at a time.
A(n) _______________ organizes and protects the horizontal
cabling in the
telecommunications room.
A. rack
B. patch panel
C. outlet
D. 110 jack Correct Answers patch panel