Question 41
-
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as
HTTP, port 80.True
False
1.25 points
Question 42
-
The PPP headers and trailers used to create a PPP frame that
encapsulates Network layer packets vary between 8 and 10 bytes in
size due to what field?a. FCS b. FEC c. encryption d. priority
1.25 points
Question 43
-
The Virtual Network Computing (VNC) application uses the
cross-platform remote frame buffer (RFB) protocol.True
False
1.25 points
Question 44
-
The combination of a public key and a private key are known by
what term below?a. key tie b. key pair c. key set d. key team
1.25 points
Question 45
-
The use of certificate authorities to associate public keys with
certain users is known by what term?a. public-key infrastructure b. certified infrastructure c. symmetric identification d. public-key organization
1.25 points
Question 46
-
VMware Player and Linux KVM are both examples of what type of
hypervisor?a. Type 2 hypervisor b. Type 1 hypervisor c. barebones hypervisor d. bare-metal hypervisor
1.25 points
Question 47
-
What IEEE standard specifies how VLAN information appears in
frames and how switches interpret that information?a. 802.1c b. 802.1V c. 802.1d d. 802.1Q
1.25 points
Question 48
-
What cloud service model involves providing applications through
an online user interface, providing for compatibility with a
multitude of different operating systems and devices?a. XaaS b. SaaS c. PaaS d. IaaS
1.25 points
Question 49
-
What command will set the native VLAN on a Juniper switch
port?a. config native vlan b. switchport trunk native vlan c. switchport set native vlan d. set native-vlan-id
1.25 points
Question 50
-
What does the VLAN Trunk Protocol (VTP) do?
a. It is the protocol used by a trunk port for establishing a trunk
with another switch.b. It shares VLAN database information amongst switches that
participate.c. It shares trunking information amongst switches that
participate.d. It is the protocol that defines how VLAN tagging is accomplished
in an Ethernet network.
1.25 points
Question 51
-
What is NOT a potential disadvantage of utilizing
virtualization?a. Licensing costs can be high due to every instance of commercial
software requiring a separate license.b. Virtualization software increases the complexity of backups,
making creation of usable backups difficult.c. Multiple virtual machines contending for finite resources can
compromise performance.d. Increased complexity and administrative burden can result from
the use of virtual machines.
1.25 points
Question 52
-
What is NOT one of the ways in which networks are commonly
segmented?a. by device manufacturer b. by device types c. by geographic location d. by departmental boundaries
1.25 points
Question 53
-
What is the maximum number of host IP addresses that can exist
in a Class B network?a. 65,534 b. 32,766 c. 8190 d. 1022
1.25 points
Question 54
-
What open-source VPN protocol utilizes OpenSSL for encryption
and has the ability to possibly cross firewalls where IPsec might
be blocked?a. OpenVPN b. Point-to-Point Tunneling Protocol (PPTP) c. Generic Routing Encapsulation (GRE) d. Layer 2 Tunneling Protocol (L2TP)
1.25 points
Question 55
-
What security encryption protocol requires regular
re-establishment of a connection and can be used with any type of
TCP/IP transmission?a. SSL b. TLS c. L2TP d. IPsec
1.25 points
Question 56
-
What special enterprise VPN supported by Cisco devices creates
VPN tunnels between branch locations as needed rather than
requiring constant, static tunnels?a. Dynamic SmartVPN b. Dynamic Multipoint VPN c. Auto Switched VPN Service d. Symmetric VPN Autodial
1.25 points
Question 57
-
What statement regarding the SSH (Secure Shell) collection of
protocols is accurate?a. SSH provides a graphical view of the remote computer. b. SSH does not protect against IP spoofing. c. SSH supports port forwarding. d. SSH does not protect against DNS spoofing.
1.25 points
Question 58
-
What subnet mask can be used to segment the 172.16.0.0 network
to allow for a minimum of 6 subnets while maximizing the number of
hosts per subnet?a. 255.255.192.0 b. 255.255.224.0 c. 255.255.248.0 d. 255.255.128.0
1.25 points
Question 59
-
What term is used to describe a space that is rented at a data
center facility by a service provider?a. point of presence (PoP) b. locally exchanged data point (ledp) c. central service point (CSP) d. service location (SL)
1.25 points
Question 60
-
What type of scenario would be best served by using a Platform
as a Service (PaaS) cloud model?a. A group of developers needs access to multiple operating systems
and the runtime libraries that the OS provides.b. An organization needs to have a hosted virtual network
infrastructure for their services, which are run on virtual
machines.c. A small organization needs to have high availability for their
web server.d. An organization wishes to gain access to applications through an
online user interface, while maintaining compatibility across
operating systems.
Answer
Question 41
-
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as
HTTP, port 80.
ANSWER:false
42.
The PPP headers and trailers used to create a PPP frame that
encapsulates Network layer packets vary between 8 and 10 bytes in
size due to what field?
Answer:FCS
43.
The Virtual Network Computing (VNC) application uses the
cross-platform remote frame buffer (RFB) protocol.
Answer:true
44.
The combination of a public key and a private key are known by
what term below?
Answer: keypair
45.
The use of certificate authorities to associate public keys with
certain users is known by what term?
Answer: public-key infrastructure
46.
VMware Player and Linux KVM are both examples of what type of
hypervisor?
Answer: Type 2 hypervisor
47.
What IEEE standard specifies how VLAN information appears in
frames and how switches interpret that information?
Answer: 802.1Q
48.
What cloud service model involves providing applications through
an online user interface, providing for compatibility with a
multitude of different operating systems and devices?
Answer:Iaas
49.
What command will set the native VLAN on a Juniper switch
port?
Answer: set native-vlan-id
50.
What does the VLAN Trunk Protocol (VTP) do?
Answer:It shares VLAN database information amongst switches that
participate.
51.
What is NOT a potential disadvantage of utilizing
virtualization?
Answer: Virtualization software increases the complexity of
backups, making creation of usable backups difficult
52.
What is NOT one of the ways in which networks are commonly
segmented?
Answer:by device manufacturer
53.
What is the maximum number of host IP addresses that can exist
in a Class B network?
Answer:65534
54.
What open-source VPN protocol utilizes OpenSSL for encryption
and has the ability to possibly cross firewalls where IPsec might
be blocked?
Answer:OpenVPN
55.What security encryption protocol requires regular
re-establishment of a connection and can be used with any type of
TCP/IP transmission?
Answer:IPsec
56.
What special enterprise VPN supported by Cisco devices creates
VPN tunnels between branch locations as needed rather than
requiring constant, static tunnels?
Answer:Dynamic Multipoint VPN
57.
What statement regarding the SSH (Secure Shell) collection of
protocols is accurate?
Answer:SSH supports port forwarding.
58.What subnet mask can be used to segment the 172.16.0.0
network to allow for a minimum of 6 subnets while maximizing the
number of hosts per subnet?
Answer: 255.255.224.0
59.What term is used to describe a space that is rented at a
data center facility by a service provider?
Answer: point of presence
60.
What type of scenario would be best served by using a Platform
as a Service (PaaS) cloud model?
Answer:A group of developers needs access to multiple operating
systems and the runtime libraries that the OS provides.