Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C172 - Network & Security Foundations - PA

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
20-02-2023
Written in
2022/2023

C172 - Network & Security Foundations - PA Which OSI layer is related to the function of the IP protocol suite? Network Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices within the same collision domain? Data link 00:0902:01 Which OSI layer would define the scope of a protocol that makes sure packets of data are received correctly and resends them if they are not? Transport Which protocol suite performs functions of OSI layer 4? TCP Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length? Cat6a Which Internet access technology uses ordinary telephone wires for data transmission? DSL Which device is used to organize network cables as they run between switches and other network devices? Patch panel Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding? Router Which network device is used to convert between digital information from a LAN and analog signals for transmission over a standard telephone wire? Modem Which device could be used to send commands to the mainframe for remote execution in early mainframe installations? Dumb terminals Which device is responsible for implementing network address translation (NAT)? Router Which command produces the following output? Non-authoritative answer:Name: Address: 172.217.11.132 nslookup Which command should be used to manually enter the default gateway for a computer? route Which network diagnostic tool displays the path packets take between two endpoints? traceroute Which network type is used to wire multiple PCs to a home router? LAN An office's infrastructure connects network devices and printers through a central access point without the use of cabling. Which network type does this office use? WLAN What type of medium is commonly used within a 1000 Mbps Ethernet network? Cat5e Which network topology is shown in the following diagram? Full mesh Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node? Ring In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started? Ring Which OSI layer ensures error-free packets? Transport Which topology uses a switch or hub to connect to all devices in the same network? Star Which cloud service provides hardware, operating systems, and web servers but not end-user applications? PaaS Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations? Community Which type of software is used to provide virtualization? Hypervisor A user that does not want to be identified while communicating on a network uses an application to alter the computer’s identity. Which type of exploit is being perpetrated? Spoofing An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer’s cache of IP address to MAC address mappings that are cached. Which exploit is the attacker perpetrating? ARP poisoning Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself? Wiretapping Which type of attack can overwhelm a web server by inserting more data into a web form than the system was configured to hold? Buffer overflow Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information? Phishing A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department. Which tool or utility will allow the user to watch network traffic in real time to identify a target? Sniffer Which group of attackers is typically used for penetration testing? Red team Which type of attack exploits an unpatched software vulnerability? Zero-day A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker’s account with the new user password to see if they can log in as the coworker. Which type of vulnerability does this create? Default password An employee that does not want to miss emails from important clients sets up her cellular smartphone to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone. What type of vulnerability is represented? BYOD/mobile [...] [...] What is required to establish a secure connection to a remote ne

Show more Read less
Institution
Course

Content preview

C172 - Network & Security Foundations -
PA
Which OSI layer is related to the function of the IP protocol suite?

Network

Which OSI layer is responsible for organizing how bits are passed over the physical layer between
devices within the same collision domain?

Data link

00:0902:01

Which OSI layer would define the scope of a protocol that makes sure packets of data are received
correctly and resends them if they are not?

Transport

Which protocol suite performs functions of OSI layer 4?

TCP

Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its
maximum 100-meter length?

Cat6a

Which Internet access technology uses ordinary telephone wires for data transmission?

DSL

Which device is used to organize network cables as they run between switches and other network
devices?

Patch panel

Which network device is used to connect two or more network segments by performing OSI layer 3
functions like packet-forwarding?

Router

Which network device is used to convert between digital information from a LAN and analog signals for
transmission over a standard telephone wire?

Modem

Which device could be used to send commands to the mainframe for remote execution in early
mainframe installations?

Dumb terminals

, Which device is responsible for implementing network address translation (NAT)?

Router

Which command produces the following output?

Non-authoritative answer:Name: www.google.comAddress: 172.217.11.132

nslookup

Which command should be used to manually enter the default gateway for a computer?

route

Which network diagnostic tool displays the path packets take between two endpoints?

traceroute

Which network type is used to wire multiple PCs to a home router?

LAN

An office's infrastructure connects network devices and printers through a central access point
without the use of cabling. Which network type does this office use?

WLAN

What type of medium is commonly used within a 1000 Mbps Ethernet network?

Cat5e

Which network topology is shown in the following diagram?

Full mesh




Which network topology is being implemented when each node connects to exactly two other nodes,
forming a single continuous pathway for signals through each node?

Ring

In which physical LAN topology are nodes connected to each other with a backbone cable that loops
around and ends at the same point it started?

Ring

Which OSI layer ensures error-free packets?

Transport

Written for

Course

Document information

Uploaded on
February 20, 2023
Number of pages
7
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CertifiedGrades Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
145
Member since
3 year
Number of followers
61
Documents
8740
Last sold
3 weeks ago
High Scores

Hi there! Welcome to my online tutoring store, your ultimate destination for A+ rated educational resources! My meticulously curated collection of documents is designed to support your learning journey. Each resource has been carefully revised and verified to ensure top-notch quality, empowering you to excel academically. Feel free to reach out to consult with me on any subject matter—I'm here to help you thrive!

3.9

38 reviews

5
21
4
6
3
2
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions