100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Network+ (6th ed) Final Exam Practice Questions with Answers Correct!!

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A
Geüpload op
27-05-2025
Geschreven in
2024/2025

Which tools are tunneling protocols? PPTP and L2TP OpenVPN and IPsec IPSec and Radius HTTP and HTTPS - ANSWERSPPTP and L2TP A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network is commonly called a(n) __________ connection. host-to-site open virtual routed - ANSWERShost-to-site Which tool can be used to identify the location of a cable break in a copper cable? cable tester certifier time domain reflectometer optical time domain reflectometer - ANSWERStime domain reflectometer Which document is arguably the most famous of all security policies as this is one document that pretty much everyone who works for any organization is required to read, and in many cases sign, before they can start work? material safeties data sheet (MSDS) forensics report acceptable use policy (AUP) exit plan - ANSWERSacceptable use policy (AUP) Generally, what do software as a service (SaaS) providers charge you for? security what you use subscriptions time - ANSWERSsubscriptions Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks? Aircrack-ng Armitage Kali Linux OpenVAS - ANSWERSAircrack-ng Which command can be used on a Windows computer to view the IP settings? ip ss ipconfig ifconfig - ANSWERSipconfig What is an advantage of fiber-optic cabling? signals travel more slowly easier and cheaper to install than UTP greater maximum distance susceptible to electrical interference - ANSWERSgreater maximum distance Which component houses network engineers and technicians who maintain the applications housed in the data center, such as databases, Web servers, and so forth? main distribution frame (MDF) power distribution unit (PDU) intermediate distribution frame (IDF) network operations center (NOC) - ANSWERSnetwork operations center (NOC) Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems? 2427 and 2727 5004 and 5005 5030 and 5031 5060 and 5061 - ANSWERS5060 and 5061 Which term refers to a single computer under the control of an operator? DDoS smurf attack phishing zombie - ANSWERSzombie Which value of the ECN field indicates "QoS aware, no congestion"? 00 10 11 20 - ANSWERS10 Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet? peer-to-peer dial-up client/server virtual private network (VPN) - ANSWERSvirtual private network (VPN) Which term represents a measurement of how well a wireless device is connecting to other devices? mode signal strength link state access - ANSWERSsignal strength The physical location where connections come in from the outside world is known as the ____________________. telecommunications room (TCR) customer premises equipment (CPE) demarcation point (demarc) power distribution unit (PDU) - ANSWERSdemarcation point (demarc) Which service is considered to be the middle of the service-layer cake? platform as a service (PaaS) desktop as a service (DaaS) software as a service (SaaS) infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS) Which tool is an installed on the system in lieu of an operating system? infrastructure as a service Type 2 hypervisor infrastructure as code Type 1 hypervisor - ANSWERSType 1 hypervisor Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools? rootkit worm macro Trojan horse - ANSWERSrootkit Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack? DDoS smurf attack phishing DHCP snooping - ANSWERSDDoS Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process? broadcast connection-oriented connectionless multicast - ANSWERSconnection-oriented What type of unit is formed by two or more wireless nodes communicating in ad hoc mode? basic service set (BSS) basic service set identifier (BSSID) independent basic service set (IBSS) extended service set (ESS) - ANSWERSindependent basic service set (IBSS) Virtualization usually refers to running software on a computer to create a _________________, an environment that imitates a physical machine. host server terminal emulator virtual machine hard disk - ANSWERSvirtual machine

Meer zien Lees minder
Instelling
Network+
Vak
Network+










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Network+
Vak
Network+

Documentinformatie

Geüpload op
27 mei 2025
Aantal pagina's
22
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Network+ (6th ed) Final Exam Practice
Questions with Answers Correct!!
Which tools are tunneling protocols?

PPTP and L2TP
OpenVPN and IPsec
IPSec and Radius
HTTP and HTTPS - ANSWERSPPTP and L2TP

A type of VPN connection where a single computer logs into a remote network and
becomes, for all intents and purposes, a member of that network is commonly called
a(n) __________ connection.

host-to-site
open
virtual
routed - ANSWERShost-to-site

Which tool can be used to identify the location of a cable break in a copper cable?

cable tester
certifier
time domain reflectometer
optical time domain reflectometer - ANSWERStime domain reflectometer

Which document is arguably the most famous of all security policies as this is one
document that pretty much everyone who works for any organization is required to read,
and in many cases sign, before they can start work?

material safeties data sheet (MSDS)
forensics report
acceptable use policy (AUP)
exit plan - ANSWERSacceptable use policy (AUP)

,Generally, what do software as a service (SaaS) providers charge you for?

security
what you use
subscriptions
time - ANSWERSsubscriptions

Which tool is an open-source tool for penetration testing pretty much every aspect of
wireless networks?

Aircrack-ng
Armitage
Kali Linux
OpenVAS - ANSWERSAircrack-ng

Which command can be used on a Windows computer to view the IP settings?

ip
ss
ipconfig
ifconfig - ANSWERSipconfig

What is an advantage of fiber-optic cabling?

signals travel more slowly
easier and cheaper to install than UTP
greater maximum distance
susceptible to electrical interference - ANSWERSgreater maximum distance

Which component houses network engineers and technicians who maintain the
applications housed in the data center, such as databases, Web servers, and so forth?

main distribution frame (MDF)
power distribution unit (PDU)
intermediate distribution frame (IDF)
network operations center (NOC) - ANSWERSnetwork operations center (NOC)

Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems?

2427 and 2727
5004 and 5005
5030 and 5031
5060 and 5061 - ANSWERS5060 and 5061

Which term refers to a single computer under the control of an operator?

, DDoS
smurf attack
phishing
zombie - ANSWERSzombie

Which value of the ECN field indicates "QoS aware, no congestion"?

00
10
11
20 - ANSWERS10

Which type of network is created when you use encrypted tunnels between a computer
or a remote network and a private network through the Internet?

peer-to-peer
dial-up
client/server
virtual private network (VPN) - ANSWERSvirtual private network (VPN)

Which term represents a measurement of how well a wireless device is connecting to
other devices?

mode
signal strength
link state
access - ANSWERSsignal strength

The physical location where connections come in from the outside world is known as
the ____________________.

telecommunications room (TCR)
customer premises equipment (CPE)
demarcation point (demarc)
power distribution unit (PDU) - ANSWERSdemarcation point (demarc)

Which service is considered to be the middle of the service-layer cake?

platform as a service (PaaS)
desktop as a service (DaaS)
software as a service (SaaS)
infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS)

Which tool is an installed on the system in lieu of an operating system?

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Bestgrades2 West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
23
Lid sinds
1 jaar
Aantal volgers
0
Documenten
4063
Laatst verkocht
2 maanden geleden

4,0

3 beoordelingen

5
1
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen