cis 175 final exam answers

6
CIS 175 Final Exam Answers http://www.homeworkarena.com/cis-175-final-exam-solved- CIS 175 Final Exam Solved CIS175 Final Exam All Possible Questions With Answers • Question 1 The image below is an example of what type of WAN connection? • Question 2 Which of the following is a type of coaxial cable? (Choose 2) • Question 3 Which of the following is a common Layer 2 protocol that could run over a dedicated leased line? • Question 4 SONET uses ________ cabling and offers high data rates, typically in the ________ Mbps— ________ Gbps range, and long-distance limitations, typically in the ________ km— ________ km range. • Question 5 The data rates for T3 link is ________. • Question 6 A common Layer 2 protocol used on dedicated leased lines is ________. • Question 7 If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link? • Question 8 When a wireless channel uses more than one frequency the transmission method called ________ spectrum. • Question 9

Upload: friendsandfamily

Post on 12-Sep-2015

2 views

Category:

Documents


1 download

DESCRIPTION

CIS 175 Final Exam Answers

TRANSCRIPT

CIS 175 Final Exam Answershttp://www.homeworkarena.com/cis-175-final-exam-solved-CIS 175 Final Exam SolvedCIS175 Final Exam All Possible Questions With Answers Question 1The image below is an example of what type of WAN connection? Question 2Which of the following is a type of coaxial cable? (Choose 2) Question 3Which of the following is a common Layer 2 protocol that could run over a dedicated leased line? Question 4SONET uses ________ cabling and offers high data rates, typically in the ________ Mbps ________ Gbps range, and long-distance limitations, typically in the ________ km ________ km range. Question 5The data rates for T3 link is ________. Question 6A common Layer 2 protocol used on dedicated leased lines is ________. Question 7If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link? Question 8When a wireless channel uses more than one frequency the transmission method called ________ spectrum. Question 9To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except: Question 10WLAN security based on a PSK technology is called ________ mode. Question 11The wireless device that is marked X in the image below is a ________. Question 12WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________. Question 13Which is NOT a security threat for WLANs? Question 14Which of the following is one of the broad categories of wireless antennae that are based on coverage? (Choose 2) Question 15The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? Question 16Which QoS design consideration is incorrect? Question 17Which term is best described by the following definition: Both NICs are active at the same time, and they each have their own MAC address? Question 18Which of the following is one of the two modes of Network Interface Card (NIC) redundancy? (Choose 2) Question 19The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers. Question 20Which command is a UNIX command? Question 21A route can be added by using the route ________ command. Question 22Which command is a UNIX command? Question 23Which UNIX ARP option below is use to display current ARP entries in a UNIX Hosts ARP table? Question 24The ________ command can be used to see what a Layer 2 MAC address corresponds to a known Layer 3 IP address. Question 25The ________ command pings every router hop from the source to the destination and reports the round-trip time for each router hop. Question 26The ________ command displays NetBIOS information in IP-based networks. Question 27Which of the following is NOT a UNIX CLI command? Question 28Imagine that you have been troubleshooting a network cable (either copper or fiber optic), and you determine that there is a break in the cable. What would you use to identify exactly where the break exists? Question 29What does the acronym PPDIOO stand for? Question 30Which of the devices shown is a Throughput Tester? Question 31When working with copper cabling (as opposed to fiber optic) a ________ can check a variety of a cables electrical characteristics. Question 32What kind of information would you find in an Application Log? Question 33What is the name of the instrument pictured below? Question 34What does a Throughput Tester do? Question 35Which of the approaches is used to determine the password of a system account or a user account? (Choose 2) Question 36Which of the following is NOT an example of an integrity violation? Question 37Which of the following is a firewall device type? (Choose 2) Question 38What type of integrity attack is described in the diagram below? Question 39What are the three primary goals of network security? Question 40What are the three types of malicious traffic detection methods? Question 41What type of availability attack is described in the diagram below? Question 42________ can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection. Question 43What is the administrative distance of Routing Information Protocol (RIP) routing protocol? Question 44Which of the following is a common OSI Layer 3 (network layer) troubleshooting issue? (Choose 2) Question 45Look at the topology shown below. What is the design issue with this wireless network? Question 46Consider the network diagram presented below, lets assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps. Lets also assume the switches do not support MDIX.Refer to the network diagram. Identify what the Layer 1 issue would be in this topology. Question 47What is the administrative distance of Open Shortest Path First (OSFP) routing protocol? Question 48What is the administrative distance of internal Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocol? Question 49Out of these three steps above, the majority of a troubleshooters efforts are spent in which step? Question 50Which of the following is a common OSI Layer 1 (physical layer) troubleshooting issue?