Network and Security Foundations Test
Exam 2024/2025
Which method is used for error detection of Ethernet packets? (CORRECT
ANSWER)CRC - A cyclic redundancy check (CRC) is an error-detecting code
commonly used in digital networks and storage devices to detect accidental changes
to raw data. Blocks of data entering these systems get a short check value attached,
based on the remainder of a polynomial division of their contents. On retrieval, the
calculation is repeated and, in the event the check values do not match, corrective
action can be taken against data corruption.
Which device forwards broadcasts and is susceptible to broadcast storms?
(CORRECT ANSWER)Bridge
Which layer of the TCP/IP stack processes a request from a host to ensure a
connection? (CORRECT ANSWER)Application
Which layer of the TCP/IP stack is responsible for establishing a network
connection? (CORRECT ANSWER)Transport
What are two responsibilities of TCP? (CORRECT ANSWER)Correcting errors
Connecting to the host
What are two advantages of subnetting? (CORRECT ANSWER)It divides the
network into smaller segments.
It separates the network and subnet address from the host address.
Which service does a RADIUS server provide? (CORRECT
ANSWER)Authenticating remote user connectivity
Which definition describes the L2TP protocol? (CORRECT ANSWER)A tunneling
protocol related to PPTP and L2F
Which command line tool will provide visibility of the system ports? (CORRECT
ANSWER)netstat
What does entry via a backdoor enable? (CORRECT ANSWER)Virus placement
Which two methods should be used to prevent password cracking? (CORRECT
ANSWER)Avoiding the use of a username as the password
Limiting the number of login attempts
Which denial-of-service attack spoofs the source network address? (CORRECT
ANSWER)Smurf
Exam 2024/2025
Which method is used for error detection of Ethernet packets? (CORRECT
ANSWER)CRC - A cyclic redundancy check (CRC) is an error-detecting code
commonly used in digital networks and storage devices to detect accidental changes
to raw data. Blocks of data entering these systems get a short check value attached,
based on the remainder of a polynomial division of their contents. On retrieval, the
calculation is repeated and, in the event the check values do not match, corrective
action can be taken against data corruption.
Which device forwards broadcasts and is susceptible to broadcast storms?
(CORRECT ANSWER)Bridge
Which layer of the TCP/IP stack processes a request from a host to ensure a
connection? (CORRECT ANSWER)Application
Which layer of the TCP/IP stack is responsible for establishing a network
connection? (CORRECT ANSWER)Transport
What are two responsibilities of TCP? (CORRECT ANSWER)Correcting errors
Connecting to the host
What are two advantages of subnetting? (CORRECT ANSWER)It divides the
network into smaller segments.
It separates the network and subnet address from the host address.
Which service does a RADIUS server provide? (CORRECT
ANSWER)Authenticating remote user connectivity
Which definition describes the L2TP protocol? (CORRECT ANSWER)A tunneling
protocol related to PPTP and L2F
Which command line tool will provide visibility of the system ports? (CORRECT
ANSWER)netstat
What does entry via a backdoor enable? (CORRECT ANSWER)Virus placement
Which two methods should be used to prevent password cracking? (CORRECT
ANSWER)Avoiding the use of a username as the password
Limiting the number of login attempts
Which denial-of-service attack spoofs the source network address? (CORRECT
ANSWER)Smurf