![]() ![]() ![]() ![]() Which type of exploit is being perpetrated? Spoofing An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer's cache of IP address to MAC address mappings that are cached. Which network type does this office use? WLAN What type of medium is commonly used within a 1000 Mbps Ethernet network? CAT5e Which network topology is shown in the following diagram? Full mesh Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node? Ring In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started? Ring Which OSI layer ensures error-free packets? Transport Which topology uses a switch or hub to connect to all devices in the same network? Star Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations? Community Which service offering provides the tools and environment for application development and testing? PaaS Which type of software is used to provide virtualization? Hypervisor A user that does not want to be identified while communicating on a network uses an application to alter the computer's identity. Name: Address: 172.217.11.132 nslookup Which network protocol allows a user to authenticate to a remote server, navigate the server's file structure, and upload and download files? ftp Which network diagnostic tool displays the path packets take between two endpoints? traceroute Which network type is used to wire multiple PCs to a home router? LAN An office's infrastructure connects network devices and printers through a central access point without the use of cabling. Which device is responsible for implementing network address translation (NAT)? Router Which command produces the following output?
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |