Network Design
Protocols
Subnetting
Models & Security
Misc.
100

When running Spanning Tree Protocol, what must be elected first?

What is a root bridge?

100

At what layer of the OSI model does the IPsec encryption protocol operate?

What is the Network Layer?

100

What is the default subnet mask for the network: 192.168.1.0

What is 255.255.255.0

100

Network model with 7 layers, used for teaching networking theory?

What is the OSI model?

100
a small network of computers contained in a relatively small area, such as an office building.
What is a LAN or Local Area Network
200

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

What is switch port-security?

200

Used to map IP Addresses to MAC Addresses

What is ARP?

200

How many usable hosts are available on each subnetwork with the address 192.168.1.0/30

What is 2?

200

Device used to filter traffic at the border of the network?

What is a Firewall?

200
a network topology that uses no cabling system between the computers.
What is wireless or wireless topology?
300

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

What is authorization?

300
The standard default internet protocol.
What is TCP/IP.
300

How many bits would you need to borrow in order to have 16 subnetworks?

What is 4

300

A person with technical skills and malicious intent that tries to break into the network?

What is a hacker?

300
a large number of computers spread over a large area.
What is WAN or wide area network
400

Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?

What is Port Mirroring?

400
Used to hand out IP addresses.
What is DHCP?
400

What is the CIDR notation for the subnet mask: 255.255.255.248

What is /29?

400

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

What is a logic bomb?

400
type of cable that uses light and is immune to lightning strikes
What is fiber optic cable
500

Which type of backup scheme only covers data that has changed since the last backup?

What is incremental backup?

500
This is what it is called when two or more are combined together.
What is a protocol suite?
500

If you borrow two bits for the subnetwork, how usable host addresses will you have on each one?

What is 64?

500

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

What is tailgating?

500

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

What is Layer 2 (Data Link)?