100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Network+ (6th ed) Final Exam Practice Questions with Answers Correct!!

Puntuación
-
Vendido
-
Páginas
22
Grado
A
Subido en
27-05-2025
Escrito en
2024/2025

Which tools are tunneling protocols? PPTP and L2TP OpenVPN and IPsec IPSec and Radius HTTP and HTTPS - ANSWERSPPTP and L2TP A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network is commonly called a(n) __________ connection. host-to-site open virtual routed - ANSWERShost-to-site Which tool can be used to identify the location of a cable break in a copper cable? cable tester certifier time domain reflectometer optical time domain reflectometer - ANSWERStime domain reflectometer Which document is arguably the most famous of all security policies as this is one document that pretty much everyone who works for any organization is required to read, and in many cases sign, before they can start work? material safeties data sheet (MSDS) forensics report acceptable use policy (AUP) exit plan - ANSWERSacceptable use policy (AUP) Generally, what do software as a service (SaaS) providers charge you for? security what you use subscriptions time - ANSWERSsubscriptions Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks? Aircrack-ng Armitage Kali Linux OpenVAS - ANSWERSAircrack-ng Which command can be used on a Windows computer to view the IP settings? ip ss ipconfig ifconfig - ANSWERSipconfig What is an advantage of fiber-optic cabling? signals travel more slowly easier and cheaper to install than UTP greater maximum distance susceptible to electrical interference - ANSWERSgreater maximum distance Which component houses network engineers and technicians who maintain the applications housed in the data center, such as databases, Web servers, and so forth? main distribution frame (MDF) power distribution unit (PDU) intermediate distribution frame (IDF) network operations center (NOC) - ANSWERSnetwork operations center (NOC) Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems? 2427 and 2727 5004 and 5005 5030 and 5031 5060 and 5061 - ANSWERS5060 and 5061 Which term refers to a single computer under the control of an operator? DDoS smurf attack phishing zombie - ANSWERSzombie Which value of the ECN field indicates "QoS aware, no congestion"? 00 10 11 20 - ANSWERS10 Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet? peer-to-peer dial-up client/server virtual private network (VPN) - ANSWERSvirtual private network (VPN) Which term represents a measurement of how well a wireless device is connecting to other devices? mode signal strength link state access - ANSWERSsignal strength The physical location where connections come in from the outside world is known as the ____________________. telecommunications room (TCR) customer premises equipment (CPE) demarcation point (demarc) power distribution unit (PDU) - ANSWERSdemarcation point (demarc) Which service is considered to be the middle of the service-layer cake? platform as a service (PaaS) desktop as a service (DaaS) software as a service (SaaS) infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS) Which tool is an installed on the system in lieu of an operating system? infrastructure as a service Type 2 hypervisor infrastructure as code Type 1 hypervisor - ANSWERSType 1 hypervisor Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools? rootkit worm macro Trojan horse - ANSWERSrootkit Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack? DDoS smurf attack phishing DHCP snooping - ANSWERSDDoS Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process? broadcast connection-oriented connectionless multicast - ANSWERSconnection-oriented What type of unit is formed by two or more wireless nodes communicating in ad hoc mode? basic service set (BSS) basic service set identifier (BSSID) independent basic service set (IBSS) extended service set (ESS) - ANSWERSindependent basic service set (IBSS) Virtualization usually refers to running software on a computer to create a _________________, an environment that imitates a physical machine. host server terminal emulator virtual machine hard disk - ANSWERSvirtual machine

Mostrar más Leer menos
Institución
Network+
Grado
Network+










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Network+
Grado
Network+

Información del documento

Subido en
27 de mayo de 2025
Número de páginas
22
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Network+ (6th ed) Final Exam Practice
Questions with Answers Correct!!
Which tools are tunneling protocols?

PPTP and L2TP
OpenVPN and IPsec
IPSec and Radius
HTTP and HTTPS - ANSWERSPPTP and L2TP

A type of VPN connection where a single computer logs into a remote network and
becomes, for all intents and purposes, a member of that network is commonly called
a(n) __________ connection.

host-to-site
open
virtual
routed - ANSWERShost-to-site

Which tool can be used to identify the location of a cable break in a copper cable?

cable tester
certifier
time domain reflectometer
optical time domain reflectometer - ANSWERStime domain reflectometer

Which document is arguably the most famous of all security policies as this is one
document that pretty much everyone who works for any organization is required to read,
and in many cases sign, before they can start work?

material safeties data sheet (MSDS)
forensics report
acceptable use policy (AUP)
exit plan - ANSWERSacceptable use policy (AUP)

,Generally, what do software as a service (SaaS) providers charge you for?

security
what you use
subscriptions
time - ANSWERSsubscriptions

Which tool is an open-source tool for penetration testing pretty much every aspect of
wireless networks?

Aircrack-ng
Armitage
Kali Linux
OpenVAS - ANSWERSAircrack-ng

Which command can be used on a Windows computer to view the IP settings?

ip
ss
ipconfig
ifconfig - ANSWERSipconfig

What is an advantage of fiber-optic cabling?

signals travel more slowly
easier and cheaper to install than UTP
greater maximum distance
susceptible to electrical interference - ANSWERSgreater maximum distance

Which component houses network engineers and technicians who maintain the
applications housed in the data center, such as databases, Web servers, and so forth?

main distribution frame (MDF)
power distribution unit (PDU)
intermediate distribution frame (IDF)
network operations center (NOC) - ANSWERSnetwork operations center (NOC)

Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems?

2427 and 2727
5004 and 5005
5030 and 5031
5060 and 5061 - ANSWERS5060 and 5061

Which term refers to a single computer under the control of an operator?

, DDoS
smurf attack
phishing
zombie - ANSWERSzombie

Which value of the ECN field indicates "QoS aware, no congestion"?

00
10
11
20 - ANSWERS10

Which type of network is created when you use encrypted tunnels between a computer
or a remote network and a private network through the Internet?

peer-to-peer
dial-up
client/server
virtual private network (VPN) - ANSWERSvirtual private network (VPN)

Which term represents a measurement of how well a wireless device is connecting to
other devices?

mode
signal strength
link state
access - ANSWERSsignal strength

The physical location where connections come in from the outside world is known as
the ____________________.

telecommunications room (TCR)
customer premises equipment (CPE)
demarcation point (demarc)
power distribution unit (PDU) - ANSWERSdemarcation point (demarc)

Which service is considered to be the middle of the service-layer cake?

platform as a service (PaaS)
desktop as a service (DaaS)
software as a service (SaaS)
infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS)

Which tool is an installed on the system in lieu of an operating system?
$16.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Bestgrades2 West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
23
Miembro desde
1 año
Número de seguidores
0
Documentos
4063
Última venta
2 meses hace

4.0

3 reseñas

5
1
4
1
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes