COMPLETE SOLUTIONS
Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its
maximum 100-meter length? correct answer: CAT 6a
Which Internet access technology uses ordinary telephone wires for data transmission? correct
answer: DSL
Which device is used to organize network cables as they run between switches and other network
devices? correct answer: Patch panel
Which network device is used to connect two or more network segments by performing OSI
layer 3 functions like packet-forwarding? correct answer: Router
Which network device is used to convert between digital information from a LAN and analog
signals for transmission over a standard telephone wire? correct answer: Modem
Which device could be used to send commands to the mainframe for remote execution in early
mainframe installations? correct answer: Dumb terminals
Which device is responsible for implementing network address translation (NAT)? correct
answer: Router
Which command produces the following output?
Non-authoritative answer:
Name: www.google.com
Address: 172.217.11.132 correct answer: nslookup
Which command should be used to manually enter the default gateway for a computer? correct
answer: route
Which network diagnostic tool displays the path packets take between two endpoints? correct
answer: traceroute
Which network type is used to wire multiple PCs to a home router? correct answer: LAN
An office's infrastructure connects network devices and printers through a central access point
without the use of cabling. Which network type does this office use? correct answer: WLAN
What type of medium is commonly used within a 1000 Mbps Ethernet network? correct answer:
CAT5e
Which network topology is shown in the following diagram? correct answer: mesh
, Which network topology is being implemented when each node connects to exactly two other
nodes, forming a single continuous pathway for signals through each node? correct answer: ring
In which physical LAN topology are nodes connected to each other with a backbone cable that
loops around and ends at the same point it started? correct answer: ring
Which cloud service provides hardware, operating systems, and web servers but not end-user
applications? correct answer: PaaS
Which cloud model provides an exclusive cloud computing service environment that is shared
between two or more organizations? correct answer: community
Which type of software is used to provide virtualization? correct answer: hypervisor
Which OSI layer ensures error-free packets? correct answer: transport
Which topology uses a switch or hub to connect to all devices in the same network? correct
answer: star
A user that does not want to be identified while communicating on a network uses an application
to alter the computer's identity. Which type of exploit is being perpetrated? correct answer:
spoofing
An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the
network computer's cache of IP address to MAC address mappings that are cached.
Which exploit is the attacker perpetrating? correct answer: ARP poisoning
Which exploit actually breaches the physical medium or uses devices to monitor signals from
outside the physical medium itself? correct answer: wiretapping
Which type of attack can overwhelm a web server by inserting more data into a web form than
the system was configured to hold? correct answer: buffer overflow
Which type of attack sends an email claiming to be from a reputable business in order to entice
the recipient to provide sensitive information? correct answer: phishing
A user on a network is planning to launch an exploit against a coworker in a neighboring
department. The user needs to identify the IP address of a coworker in the desired department.
Which tool or utility will allow the user to watch network traffic in real time to identify a target?
correct answer: sniffer
Which group of attackers is typically used for penetration testing? correct answer: red team