FINAL EXAM STUDY GUIDE 2026
COMPLETE QUESTIONS | VERIFIED
ANSWERS | 100% CORRECT | GRADED A+|
PASS GUARANTEED
Which service offering provides the tools and environment for application
development and testing? - ANSWER PaaS
Which type of software is used to provide virtualization? -
ANSWER Hypervisor
A user that does not want to be identified while communicating on a network uses
an application to alter the computer's identity.
Which type of exploit is being perpetrated? - ANSWER Spoofing
An attacker attempts to misdirect traffic on a network back to the attacker by
corrupting the network computer's cache of IP address to MAC address mappings
that are cached.
Which exploit is the attacker perpetrating? - ANSWER ARP poisoning
, Which exploit actually breaches the physical medium or uses devices to monitor
signals from outside the physical medium itself? - ANSWER Wiretapping
Which type of attack can overwhelm a web server by inserting more data into a
web form than the system was configured to hold? - ANSWER Buffer overflow
Which type of attack sends an email claiming to be from a reputable business in
order to entice the recipient to provide sensitive information? -
ANSWER Phishing
A user on a network is planning to launch an exploit against a coworker in a
neighboring department. The user needs to identify the IP address of a coworker in
the desired department.
Which tool or utility will allow the user to watch network traffic in real time to
identify a target? - ANSWER Sniffer
Which type of attack exploits an unpatched software vulnerability? -
ANSWER Zero-day
Which network vulnerability can be reduced by adding biometric authentication
devices? - ANSWER Weak passwords
Which of the following issues are handled/managed by QoS to ensure a functional
VoIP network? - ANSWER Latency
Jitter
, What specific hardware do layer 3 switches use to handle packet switching? -
ANSWER Layer 3 networking switches use application-specific integrated
circuits (ASICs) for packet switching, which allows them to have very high
forwarding rates.
What device is used to connect a wireless LAN and a wired LAN and allows all
devices to communicate together and to connect to other external networks? -
ANSWER Wireless router
What IPv6 feature allows an address's interface identifier to be automatically
derived from an interface's MAC address? - ANSWER Stateless address
autoconfiguration (SLAAC) allows for a server-less basic network configuration,
using a prefix advertised from the local IPv6 router and the EUI-64 process, which
converts a local interface's MAC address into an interface identifier.
Which characteristics are common of horizontal cabling in a building? -
ANSWER Uses star topology
Extends from closet to work area
What is the name for a formal agreement between two or more parties that
establishes official service partnerships? - ANSWER memorandum of
understanding (MOU)
Which authentication protocols are commonly used with PPP? -
ANSWER CHAP
, PAP
Which features were introduced as part of 802.11ac? - ANSWER MU-MIMO
Standardized beamforming
What types of virtual switches are commonly supported by hypervisors? -
ANSWER dvSwitch
vSwitch
Which options are characteristics of ADSL? - ANSWER Distance limitation of
18,000 feet
Maximum upstream bandwidth of 1.544Mbps
Which terms are used to describe the references used by antivirus software to find
viruses? - ANSWER Signatures
Definitions
The IP address 10.10.20.250 is an example of which of the following? -
ANSWER A nonroutable Internet IP address
A Class A address
A private IP address
What information is not included in an Ethernet frame? - ANSWER Frame size