Subnetting
Network Devices
Connectors/Cabling
WAN
Networking Attacks
100

usable IP addresses that can be assigned to hosts on a /26 subnet.

What is 62

100

A device designed to filter and transfer data packets between different types of computer networks is called

What is Router

100

The typical cable segment length for a copper twisted-pair Ethernet cable.

What is 100 meters

100

The most common type of a DSL Internet access.

What is ADSL

100

Refers to a means for executing reflective DOS attack.

What is IP Spoofing

200

The dot-decimal representation of a /13 subnet mask

What is 255.248.0.0

200

A software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through.

What is A Firewall

200

In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to reduce _______.

What is Crosstalk

200

The term "Metropolitan Ethernet" refers to an _______.

What is a MAN (Metropolitan Area Network)

200

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is known as

What is DoS Attack

300

The first usable host IP address on the 172.26.56.110/27 network.

What is 172.26.56.97

300

An application software used to selectively block access to certain websites is an example of

What is a Content Filter

300

The minimum cabling requirement for a 10 Gbps connection over copper twisted-pair.

What is CAT6

300

The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as

What is Cable Broadband

300

Malicious code activated by a specific event is known as

What is a Logic Bomb

400

The broadcast address for the 192.168.50.155/20 network.

What is 192.168.63.255

400

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called.

What is Load Balancer

400

Cabling types that provides protection against an outside signal interference. (list 3)

What is Coaxial, Fiber-optic, STP

400

The solution that enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN.

What is ISDN  (Integrated Services Digital Network)


400

a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data.  

What is Evil Twin

500

The characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space? (Select 2 answers)

What is Class A range, Non-routable (private) IP address range.

500

A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a

What is A multilayer switch

500

The term that refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path.

What is Attenuation

500

 T1 lines support data transfer rates of up to

What is 1.544 Mbps

500

A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as

What is HIDS (Host based Intrusion Detection System)