Assessment 4 - Attempt Review
Assessment 4 - Attempt Review
QUIZ
Question 1
Correct
Correct
Question 3
Correct
Correct
Correct
Correct
a. Vertical cabling
b. Horizontal cabling
c. Backbone cabling
d. Patch cabling
Question 7
Correct
a. 2.4 cm
b. 1.6 cm
c. 3.2 cm
d. 3 cm
Correct
Question 9
Correct
a. 21
b. 23
c. 53
d. 25
Correct
a. 993
b. 5060
c. 995
d. 5061
Question 11
Incorrect
a. ping 192.168.1.1
b. ping 127.0.0.1
c. ping -a 8.8.8.8
d. ping -?
Correct
a. ifconfig
b. ifconfig -a
c. sudo ifconfig eth0 down
d. man ifconfig
Question 13
Correct
Correct
Question 15
Correct
Correct
Question 17
Correct
a. Cat 5 (Category 5)
b. Cat 6a (Augmented
Category 6)
c. Cat 6 (Category 6)
d. Cat 5e (Enhanced Category 5)
Correct
a. 1
b. 3
c. 5
d. 7
Question 19
Correct
a. LC (Local connector)
b. ST (Straight Tip)
c. MT-RJ (Mechanical Transfer -
Registered Jack)
d. SC (Subscriber Connector)
Correct
a. Dirty connectors
b. Wavelength mismatch
c. Link loss
d. Fiber type mismatch
Question 21
Correct
Correct
Correct
Correct
Correct
a. Interference
b. Channel overlap
c. Insufficient wireless
coverage
d. Simultaneous wired and wireless
connections
Correct
Correct
Question 28
Correct
a. 0.4 seconds
b. 1 minute and 26 seconds
c. 14 minutes and 23 seconds
d. 8 seconds
Correct
a. NIC teaming
b. Port aggregation
c. Load balancing
d. Clustering
Question 30
Correct
a. 255.248.0.0
b. 255.240.0.0
c. 255.252.0.0
d. 255.254.0.0
Correct
a. 42
b. 170
c. 168
d. 40
Question 32
Correct
a. 255.255.224.0
b. 255.255.240.0
c. 255.255.248.0
d. 255.255.252.0
Question 33
Correct
a. 1024
b. 1022
c. 1028
d. 1026
Correct
a. 255.255.255.192
b. 255.255.255.224
c. 255.255.255.128
d. 255.255.255.252
Question 35
Correct
Correct
a. route
b. route print
c. show ip route
d. show running-config
Question 37
Correct
a. higher
b. lower
Correct
Question 39
Correct
a. Cable broadband
b. MPLS (Multiprotocol Label
Switching)
c. SD-WAN (Software-Defined Wide
Area Network)
d. Leased lines
Correct
a. A thorough examination of
each aspect of the
organization's network is
performed to determine how
it might be compromised.
b. A third-party organization is
tasked with attempting to break
into the organization and
compromise security to
determine threat vectors.
c. A report of data that is subject to
special regulation is created,
such that the organization is
aware of what data needs
protection.
d. An assessment of how a
network will perform under
stress is performed to determine
if the network throughput is
adequate.
Question 41
Correct
a. Nmap
b. Nessus
c. Metasploit
d. Honeypot
Correct
a. An NDA (Non-Disclosure
Agreement)
b. An anti-malware Policy
c. A PUA (Privileged User
Agreement)
d. An AUP (Acceptable Use Policy)
Correct
Question 44
Correct
a. Authentication
b. Authorization
c. Accounting
d. Auditing
Correct
Question 46
Correct
Correct
Question 48
Correct
a. Window policy
b. Acknowledgment policy
c. Discarding policy
d. Admission policy
Correct
Correct
a. Brownout
b. Blackout
c. Noise
d. Surge