Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP

which of the following are available protocols for security purposes? (choose all that apply.)

We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Let us know about it through the REPORT button at the bottom of the page.

Click to rate this post!
[Total: 1 Average: 5]

Which of the following are available protocols for security purposes? (Choose all that apply.)

TLS

NetBIOS

SSL

IPSec

SSH

TLS, SSL, IPSec, SSH

Which of the following services only requires a single port be opened on the firewall?

RDP

SSH

HTTP

FTP

DNS

DHCP

SNMP

HTTP

SNMP uses which port by default?

161

53

22

110

139

80

161

Step 1:

A user visits a secure website (e.g. https://xyz.com%29./ The user’s web browser will use a communication protocol called Secure Sockets Layer [SSL] (or perhaps Transport Layer Security [TLS]) to connect to the website. Part of the connection involves the website sending its digital certificate to the user’s web browser. The browser will ensure that the certificate matches the website the user is on, is not expired, is endorsed by a trusted CA, etc. If any of those checks fail, the user is alerted of a problem.

If everything checks out, the web browser generates a session key (to be used with a symmetric cipher) and uses the website’s public key to encrypt and transmit the session key to the website. Communication then proceeds using the chosen symmetric encryption algorithm and session key. A bad guy watching the network traffic will not see the key because it is encrypted — and therefore the connection is considered secure.

The website’s private key is never on the user’s computer — it always remains secured on the server (the website).

If a hacker gets into a user’s computer, that computer’s security has been compromised. On most systems, this means all bets relating to security are off. You must have a trusted computing environment to ensure security.

Step 2:

As mentioned in Step 1’s answer, if there is no trusted computing environment there can be no assurance of security.

Step 3:

Same answer as Steps’1 and 2.

An OTP is useless if the system has been compromised.

See http://en.wikipedia.org/wiki/Trusted_Computing for more details

Technical Support Fundamentals

Which of these is a valid byte? Check all that apply.
11100
11011011
00000000
10022011
11011011
00000000
How many possible values can we have with 8 bits?
256
127
1 byte
8
256
Why did UTF-8 replace the ASCII character-encoding standard?
UTF-8 can store a character in more than one byte.
ASCII can store a character in more than one byte.
ASCII can represent emoji.
UTF-8 only uses 128 values.
UTF-8 can store a character in more than one byte.
What is the highest decimal value we can represent with a byte?
Any number
255
256
2
255
Where does the CPU store its computations?
External Data Bus
Processor
Registers
Binary
Registers
Which mechanisms do we use to transport binary data and memory addresses? Check all that apply.
The External Data Bus
Address Bus
DBus
School Bus
The External Data Bus
Address Bus
What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply.
Non-moving parts
Smaller form factor
High RPMs
Uses Disk Platters
Non-moving parts
Smaller form factor
True or false: If you plug in a 220v appliance into a 120v outlet, the appliance could get damaged.
TRUE
FALSE
TRUE
How long will it take to transfer a file size of 1GB on a USB 2.0 and a USB 3.0 drive?
~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
~17 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
~ 17 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
~ 20 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
What is the difference between a ROM chip and a RAM chip? Check all that apply.
A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.
A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure.
A ROM chip stores temporary data. A RAM chip stores permanent data.
A ROM chip stores permanent data. A RAM chip stores temporary data.
A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.
A ROM chip stores permanent data. A RAM chip stores temporary data.
Which of these functions does the BIOS perform? Check all that apply.
Installs drivers
POST
Checks what devices are connected to the computer
Initializes hardware
POST
Checks what devices are connected to the computer
Initializes hardware
Where are your BIOS settings stored?
Flash drive
Hard drive
CMOS chip
RAM
CMOS chip
What is the difference between a traditional BIOS and UEFI? Check all that apply.
UEFI has better compatiblity with newer hardware.
UEFI has become the default BIOS on new systems.
A traditional BIOS has better compatibility with newer hardware.
UEFI is meant to become the new standard for BIOS.
UEFI has better compatiblity with newer hardware.
UEFI has become the default BIOS on new systems.
UEFI is meant to become the new standard for BIOS.
What are the two main parts that make up an operating system?
Kernel and Userspace
Users and Software
Kernel and Packages
Windows and Mac
Kernel and Userspace
What are the main components of file management? Check all that apply.
File data
NTFS
Metadata
File system
File data
Metadata
File system
Which of these are true? Check all that apply.
You can have many processes running for one program.
A program is a process that is executed. A process is a program that we can run.
A program is an application that we can run. A process is a program that is executed.
A program is initially stored in RAM. A process is initially stored in the hard drive.
You can have many processes running for one program.
A program is an application that we can run. A process is a program that is executed.
What are the characteristics of virtual memory? Check all that apply.
Stores pages that are currently not in use by physical memory.
Allows our computer to have more memory than it physically has.
It is where we store pages that are being executed
Combination of RAM and hard drive space.
Stores pages that are currently not in use by physical memory.
Allows our computer to have more memory than it physically has.
Combination of RAM and hard drive space.
Which of the following devices are used in networking? Check all that apply.
Switches
Hubs
Routers
TCP
Switches
Hubs
Routers
Which one of these are a valid IPv4 address? Check all that apply.
255.255.255.0
1.1.1.1
54.45.43.54
345.0.24.6
255.255.255.0
1.1.1.1
54.45.43.54
Which network protocol is used to handle the reliable delivery of information?
TCP
UDP
IP
ICMP
TCP
What is known as networking in the IT field? Check all that apply.
Designing networks
Managing networks
Building networks
Joining professional networks
Designing networks
Managing networks
Building networks
Through which of the devices listed are we able to connect to wireless networks? Check all that apply.
Radio
Smart TV
Antenna
Telephone
Radio
Antenna
What type of address do computers use to find something on a network?
IP address
MAC address
ISP address
URL address
IP address
You’re browsing the Web, and type in www.Coursera.com in the address line. Instead of the website, an error screen appears. You type in 54.174.155.206, and the Coursera website comes up. What’s the most likely reason for this?
Address line is for the IP address only, not the domain name.
There’s a problem with your Internet connection.
Web addresses must be entered in lowercase.
There’s a problem in your network’s DNS configuration.
There’s a problem in your network’s DNS configuration.
What was the biggest problem with the earliest version of the Internet in the late 1960s?
Networks couldn’t talk to each other.
The TCP/IP protocol could only be used in universities, governments, and businesses.
There was no way to remotely access any computer.
Computers were too big and bulky for accessing the Internet.
Networks couldn’t talk to each other.
You need to update your router settings, so you log into the administration panel, whose Internet Protocol (IP) address is 192.168.0.1. Which IP version is this?
IPv4
IPv6
IPv1
IPv2
IPv4
What are some examples of IoT (Internet of Things)? Check all that apply.
An online car dealership that can provide complete car history using the vehicle identification number
Refrigerators that keep track of the food and notify you when to buy more
Teachers who post assignments for their students on the school website
Thermostats that turn off the air conditioning when you leave the room
Refrigerators that keep track of the food and notify you when to buy more
Thermostats that turn off the air conditioning when you leave the room
What do we call data that’s broken down into bits and sent through a network?
Memory
Binary
Pages
Packets
Packets
What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
Border Gateway Protocol
Network Address Translation
Using IPv6 addresses
Autonomous Systems
Network Address Translation
Using IPv6 addresses
Which statement is true about the Internet and the World Wide Web?
The Internet is the World Wide Web.
The World Wide Web is a way to access the Internet.
The Internet is a way to access the World Wide Web.
The World Wide Web is the only way to access the Internet.
The World Wide Web is a way to access the Internet.
Which one of these can connect directly to the Internet?
Servers
Packets
Internet users
Clients
Servers
Which problem does IPv6 (Internet Protocol version 6) help to solve?
There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites.
Companies waste hundreds of public IP addresses. With IPv6, they can use just one IP address.
IPv5 is an outdated protocol version with insufficient security safeguards.
Internet Protocol versions prior to version 6 haven’t achieved widespread use.
There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites.
What are some examples of the impact of the Internet boom? Check all that apply.
We can sell used items to people outside of our local regions.
We can travel around the world faster than we did 100 years ago.
We can attend a university from our homes.
We have instant 24-hour access to news and entertainment.
We can sell used items to people outside of our local regions.
We can attend a university from our homes.
We have instant 24-hour access to news and entertainment.
Which statement is true about computer security?
Computer security is only necessary for governments and big businesses.
Computer security is everyone’s responsibility.
Computer security is the job of specialized security engineers.
Computer security does not affect the gaming industry.
Computer security is everyone’s responsibility.
Which of the following cables are used in networking? Check all that apply.
Auxilary cable
Fiber optic cable
HDMI cable
Ethernet
Fiber optic cable
Ethernet
True or false: You can create a network with two computers.
TRUE
FALSE
TRUE
What protocol allows us to use a domain name like google.com instead of an IP address?
NAT
TCP/IP
DNS
ICMP
DNS
You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What’s the most likely reason for this?
The domain name is registered to someone else.
Domain names must end in “.com”.
You are not the legal owner of ABC Company.
Domain names must be all in lowercase.
The domain name is registered to someone else.
Which Internet Protocol version is 100.0.0.256?
Not a valid IP address
IPv2
IPv6
IPv4
Not a valid IP address
What are the drawbacks of purchasing something online? Check all that apply.
Product selection is not as big as what’s available in physical store locations.
Someone can use your photographs in their own business and not share the profits with you.
Personal buying preferences can be tracked and used to bombard you with excessive marketing.
Confidential information like your credit card number can be stolen and used by someone else.
Personal buying preferences can be tracked and used to bombard you with excessive marketing.
Confidential information like your credit card number can be stolen and used by someone else.
What is www.google.com an example of?
URL
ICANN
ISP
HTTP
URL
Devices on a network are identified by which of the following?
MAC address and IP address
ISPs and IP addresses
Username and IP addresses
Ethernet cable
MAC address and IP address
You’re having trouble connecting to the Internet, so you call your Internet Service Provider for help. They need to know the permanent unique identifier of your networking device, to help them troubleshoot. What are they asking for?
URL address
ISP address
MAC address
IP address
MAC address
Which statements are true about routers? Check all that apply.
A router utilizes network protocols to help determine where to send data packets.
A router is a set of components that makes up computer networking.
A router can only send data to another computer that’s on the same network.
A router connects devices together and helps direct network traffic.
A router utilizes network protocols to help determine where to send data packets.
A router connects devices together and helps direct network traffic.
What was the main limitation of computer networking that the invention of the World Wide Web solved in the 1990s?
The TCP/IP protocol could only be used in universities, governments, and businesses.
People around the world could not send data to one another.
Networks couldn’t talk to each other.
People could only receive the information in the form of text.
network couldnt talk to each other
Which protocol is used to handle delivery of information from one network to another?
Internet Protocol
File Transfer Protocol
Transmission Control Protocol
Hyper Text Transfer Protocol
Transmission Control Protocol
Which network protocol is used to route IP addresses?
TCP
UDP
IP
ICMP
IP
Which of these is application software? Check all that apply.
Web browser
CPU
Email client
RAM
Web browser
Email client
Which of these is system software? Check all that apply.
CPU
Windows OS
BIOS
Text editor
Windows OS
BIOS
What is the difference between an interpreted and a compiled language? Check all that apply
Interpreted languages are broken into machine instructions beforehand.
Interpreted languages are not broken into machine instructions beforehand.
Compiled languages are translated into machine instructions beforehand.
Compiled languages are not translated into machine instructions beforehand.
Interpreted languages are not broken into machine instructions beforehand.
Compiled languages are translated into machine instructions beforehand.
In the Linux distribution Ubuntu, what command would you use to install an application?
run
application
apt
execute
apt
What are the four layers of the computer architecture?
Binary, Hardware, Operating System, Software
Hardware, Operating System, Software, User
Hardware, Windows, Software, User
Computer, Operating System, Software, User
Hardware, Operating System, Software, User
True or false: If you have a 32-bit CPU architecture, it’s recommended to use a 64-bit operating system.
TRUE
FALSE
FALSE
If you want to boot into a USB drive, how do you change your boot settings?
Replace the CPU.
Login to the machine.
Go into the BIOS settings and change the boot settings
Wipe the computer.
Go into the BIOS settings and change the boot settings
What is the file manager in macOS called?
Finder
File Explorer
Konqueror
Midnight Commander
Finder
What command can you use to create a file using bash?
cat
ls
touch
mkfile
touch
A ____ is an emulation of a physical machine.
BIOS
virtual machine
driver
kernel
virtual machine
True or false: The Internet is the World Wide Web.
TRUE
FALSE
FALSE
What is the fundamental protocol that the Internet uses today?
HTTP
FTP
DHCP
TCP/IP
TCP/IP
True or false: You should only worry about computer security if you work in a computer security role.
TRUE
FALSE
FALSE
There are 4 bytes in an IPv4 address. What is the highest decimal value you can have for one byte?
128
255
256
512
255
Which of the following protocols is the primary infrastructure that creates the Internet?
DNS
NAT
HTML
TCP/IP
TCP/IP

Was this helpful?




Leave a Comment

Your email address will not be published. Required fields are marked *