- Allows the connection of hub to hub or switch without having to use a special cable
- Which data speed and maximum cable length is not used for Category e/6 cabling? Anything other than mezzo/mobcaps (Caste) and up to mezzo, class E/mobcaps, Gossips but at a distance less than 100 meters (Cat) both up to 100 meters.
- What do the links lights on a hub or switch represent? That the transmit and receive pairs are properly aligned and the connected devices are communicating .
- What does the link light on a NICE present? Connectivity to the network.
- What is an echo request relative to computer networking? It Is part of the IGMP protocol that requests a reply from a computer.
- What Is the command used on a PC to display the MAC address? Upcoming/all
- What is the command used on a Linux machine to display the IP address? Facing
- What is the maximum length of a horizontal cable run that still allows for the length of the patch cables and extra cabling on each end? 90 meters
- A data problem is reported to the network administrator. The problem Is found to be tit the HTTP network connection. What would the network administrator do to isolate the problem. Test the link, perform a traceries command, depends on what type of problem is occurring with the cabling.
- Describes interconnection of Lana within a limited geographic area. MAN (Metropolitan Area Network)
- Which describes an Ethernet system operating at 100 Mbps? Fast Ethernet or Bassett
- What is another term for network congestion? Bottleneck
- . A network address of 192. 168. 6. 0 and a subnet mask of 255. 255. 254. 0 can be Ritter In CIDER as? 92. 168. 168. 0/3
- The three packets exchanged at the beginning of a TCP connection between two ports are: SYNC, SYNC*JACK, & JACK
- IP addresses are assigned by which of the following? ARIN (American Registry for Internet Numbers
- The connection to a router's console port input is typically which of the following? RSI-232 serial communications port using an RAJA-45 lack to connect to Its Interface
- What is the help command In the CISCO ISO? "? " is the universal help command
- AAU stands for: Attachment unit Interface
- The router interface most commonly used to Interconnect Lana to a campus network Is: Fast Ethernet
- Serial Interfaces on a router are typically used to: used to interface to other serial devices
- Clocking on the serial port of a router is set at the DATE end: False, it is DCE
- The purpose of a gateway is to allow data to enter and exit a LANA. True
- The command for saving the router's running-configuration to non-volatile memory Is: copy run start
- The administrative distance of a static route is 1
- EIGRP is classified as which of the following: link-state protocol
- What area ID should be used for the Network backbone?
- What does OSPF use to verify that two router links are communicating? "Hello Packets"
- Which file allocation table system Is best for very large multi gigabit drives today? NETS (New Technology File System
- Which of the following bus types 1 OFF roving similar services including server functions identifies which type of network? Peer-to-peer
- Dynamically assigns IP addresses to machines as needed: DDCD Server
- A red "x" on a users account in Windows 2003/2000 indicates which of the following The user is locked out for having too many login attempt failures
- This server is used to service information requests from clients. Proxy Server
- Computer Viruses and Worms cause all of the following except: Virus causes annoyance, clogging up the mail server, denial of revive, data loss, open holes for others to access your machine. Worms attack computers and can deny service to networks, they establish a "back door" in the infected computer enabling an attacker to access someone's computer
- "War Driving" is a term used to describe: someone driving with an antenna out the door of a vehicle, connected to a mobile device running Windows or Linux
- . A true Firewall "Access Control List" is used to: Access list can be configured on a router, on a true dedicated firewall, or on the host computer
- An Intrusion Detection system is designed to look for: (Select 2) looks for signatures and probing
- Telephony identifies which of the following technologies? Poi (Voice over 'P)
- Which of the following have the greatest wireless data rate? 802. 1 In provides rates over 200+ Mbps
- What are the two North American and International optical standards? (Select two) SONNET (Synchronous Optical network and SAD (Synchronous Digital Hierarchy)
- What is the meaning of the "2-Deep" rule? That the distribution in a building should only have he main distribution and the intermediate distribution that feeds the horizontal distribution to the work area
- True or False: Voice Over IP and Telephony are synonymous with each other. True
- Which Poi protocol provides for end-to-end secure communications by requiring user authentication: SIP (Secure Session Initiation Protocol)
- The following are all So concerns for Poi except: These are concerns: Jitter, Network latency and packet loss, & Queuing
- . Using Linux, the command that lists the basic files in a rectory is: Is
- Using Linux, the command that deletes a files is: arm
- To display the previously entered commands stored in the Linux history buffer you would use: history
- Using Linux, the command that is similar to the find or search command in Windows is: Greg
- The three major differences between industrial and commercial networks are: Hierarchy, Redundancy, & Determinism
- . The Ethernet protocol developed for large industrial use is: Ethernet/IP or UDP or TCP
Order custom essay Linux Security Final Review with free plagiarism report
Cite this Page
Linux Security Final Review. (2018, Sep 12). Retrieved from https://phdessay.com/linux-security-final-review/
Run a free check or have your essay done for you