100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Net 455>A computer uses a dictionary of vulnerabilities in published operations and application software $29.49   Add to cart

Exam (elaborations)

Net 455>A computer uses a dictionary of vulnerabilities in published operations and application software

 2 views  0 purchase
  • Course
  • Institution

Net 455>A computer uses a dictionary of vulnerabilities in published operations and application software

Preview 4 out of 53  pages

  • July 30, 2022
  • 53
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Net 455>A computer uses a dictionary of vulnerabilities in
published operations and application software



A computer uses a dictionary of vulnerabilities in published operations and application software
(cve.mitre.org). What is the name of this dictionary?
-CVE

A user filed a complaint with their company's helpdesk support team about threatening pop-up
messages. The messages say the user's files are encrypted due to terroristic activity and that the data
will stay encrypted until paid in bitcoin. What type of attack is the user most likely witnessing?
-Ransomware

Which type of encryption cipher is used in Wi-Fi Protected Access 2 (WPA2)? (Select all that apply.)
-Advanced Encryption Stand (AES)
-Chaining Message Authentication Code Protocol (CCMP)

A vendor visits an organization to demo a network management device. As part of the hands-on
demonstration, an IT engineer can see and manage an extended service set (ESS) on the network. Based
on the engineer's experience with the device, what is the vendor demonstrating?
-Wireless controller

A network administrator would like to setup a group of servers to retrieve the same content from a
single host on the internal network. Which of the following will allow this type of data flow? (Select all
that apply.)
-IGMP must be used to configure group membership.
-A multicast IP address is assigned to the servers.

Starting with Pin 1, what order of colored wires of a standard CAT6 network cable would make it comply
with the T568B standard?
-Orange/White, Orange, Green/White, Blue, BlueWhite, Green, Brown/White, Brown

A host uses Internet Protocol version 6 (IPv6). The host sends a
packet over the Internet using router advertisement. The IPv6
packets insert into Internet Protocol version 4 (IPv4) packets. The
packets route over the IPv4 network to their destination. What is
providing this function?
-Tunneling

A security analyst is looking at various network traffic but can't
make heads or tails of most of the packets. Which of the following
traffic would they be able to read without private keys?
-Port 110

What tool can be used to test ethernet cabling?

,-Wire map

A network consultant is installing Ethernet to a hub in the control
room. When Ethernet is wired with a hub, there needs to be a means

,of distinguishing the interface on an end system with the interface
on an intermediate system. What is the name of the end system
interface?
-MDI-X

What step of the CompTIA Network+ troubleshooting methodology
involves confirming a theory and determining the next steps to
resolve a problem?
-3

An IT engineer uses the Nmap utility to document a network. The
documentation will then help the engineer plan network
improvements. Which of the following describes the use of Nmap for
this purpose?
-Systems hardening

A cyber consultant examines the security of the control room and
evaluates the organization's maturing level and its use of
security policy and controls. What is the name of this
assessment?
-Posture assessment

A network administrator is researching network virtualization and is
trying to find a standard architecture for appliances to be developed
against. Which of these should the administrator look at for a
standard?
-NFV

A network professional is installing software onto every company
computer and phone that requires several layers of protection for
authentication. What is this called?
-Multifactor

A network consultant is conducting a test to determine the amount
of data transferred through a connection over a given period. What
is the consultant testing?
-Bandwidth

The physical security department of a bank wants to require
employees to authenticate through a locked barrier before accessing
the sensitive areas of the building, such as the IT department. If

, implemented, which of the following will best help regulate such
physical access? (Select all that apply.)
-Biometric Device
-Smart Badge

After a site survey, the network technician found the single wireless
2.4 gigahertz (Ghz) access point (AP) in a large office floor space
does not have a strong enough signal, and is contending a
significant amount of background noise and interference. What will
these findings most likely limit on the AP's wireless signal?
-They will limit the signal's range.

A multi-tenant third-party cloud service that is available via the
Internet can be described as which of the following cloud delivery
models?
-Public

A communications company uses TIA/EIA IS-95 handsets that require
each subscriber to use a code to key the modulation of their signal.
The receiver uses this "key" to extract the subscriber's traffic from
the radio signal. What type of handsets is the company using?
-CDMA

A network port does not seem to be working properly. Which of the
following tools can be used to test if the the port is sending out
data?
-Loopback plug

A computer technician is reading archived logs and identifies that
the company was using 802.11n. Not knowing what this Wi-Fi
category meant, the technician researched its origins. In recent
years, what was 802.11n renamed?
-Wi-Fi 4



Engineers survey a newly acquired set of buildings as part of an
organizational acquisition. The facilities are a few hundred yards
from one another. On-site IT staff state a fiber connection between
the buildings, but it has been very unreliable and often does not

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Pronurse. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $29.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$29.49
  • (0)
  Add to cart