Tuesday, February 9, 2016

CIS 175 FINAL EXAM


BUY HERE


CIS 175 Final Exam
This final exam consists of 50 multiple choice questions and covers the material in Chapters 7 through 13.
1.     The data rates for T3 link is ________.
2.     Which of the following is a type of coaxial cable? (Choose 2)
3.     SONET uses ________ cabling and offers high data rates, typically in the ________ Mbpsù ________ Gbps range, and long-distance limitations, typically in the ________ kmù ________ km range.
4.     Which is NOT a primary feature offered by Link Control Protocol (LCP)?
5.     A common Layer 2 protocol used on dedicated leased lines is ________.
6.     MPLS inserts a 32-bit header between Layer 2 and Layer 3 headers. Because this header is ________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a(an) ________ header.
7.     If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link?
8.     Which of the following wireless standards operate at a Maximum Bandwidth of less than 20Mbps?
9.     Which of the following is NOT a WLAN security standard?
10.   To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except:
11.   Which of the following is NOT a variation of spread-spectrum technology?
12.   When a wireless channel uses more than one frequency the transmission method called ________ spectrum.
13.   WLAN security based on a PSK technology is called ________ mode.
14.   The wireless device that is marked X in the image below is a ________.
15.   VoIP sends packets using Real-Time Transport Protocol (RTP), which is a ________
16.   Which of the following is defined as a Cisco proprietary approach to firsthop redundancy?
17.   What is the effective bandwidth in the WAN diagram below?
18.   Which is NOT a category of QoS Mechanisms?
19.   Which UNIX ARP option below is use to display current ARP entries in a UNIX Hosts' ARP table?
20.   The ________ command displays NetBIOS information in IP-based networks.
21.   Which of the following is NOT a UNIX CLI command?
22.   The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices. Multiple platforms (for example, routers, switches, and hosts) support the ________ command.
23.   The ________ command pings every router hop from the source to the destination and reports the round-trip time for each router hop.
24.   A route can be added by using the route ________ command.
25.   The ________ command can be used to resolve an FQDN to an IP address.
26.   The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers.
27.   What does the -c option do in the ping command?
28.   Which is NOT a log type in event viewer?
29.   Imagine that you have been troubleshooting a network cable (either copper or fiber optic), and you determine that there is a break in the cable. What would you use to identify exactly where the break exists?
30.   What kind of information would you find in an Application Log?
31.   Which of the devices shown is a Throughput Tester?
32.   What is the name of the instrument pictured below?
33.   A Protocol Analyzer is also known as a ________.
34.   What does a Throughput Tester do?
35.   What are the three types of malicious traffic detection methods?
36.   Which of the following is a firewall device type? (Choose 2)
37.   Which of the approaches is used to determine the password of a system account or a user account? (Choose 2)
38.   Which of the following is NOT an example of an integrity violation?
39.   Which of the following is a network vulnerability scanner? (Choose 2)
40.   What type of availability attack is described in the diagram below?
41.   What are the three primary goals of network security?
42.   What is the administrative distance of Routing Information Protocol (RIP) routing protocol?
43.   Consider the network diagram presented below, let's assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps. Let's also assume the switches do not support MDIX. 
44.   Consider the network diagram presented below, let's assume that both switches are capable of auto negotiating Ethernet speeds of 10, 100, and 1000 Mbps. Let's also assume the switches do not support MDIX. 
45.   Look at the topology shown below. What should be done to solve the problem of the channels interfering with each other?
46.   Out of these three steps above, the majority of a troubleshooter's efforts are spent in which step?
47.   ________ can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection.
48.   Which of the following is a common wireless network troubleshooting issue? (Choose 2)
49.   What is the administrative distance of internal Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocol?
50.   Which of the following is a common OSI Layer 1 (physical layer) troubleshooting issue? (Choose 2)











                     

No comments:

Post a Comment