Skip to main content

IS5203 Week 7 Quizes

Question

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____

Correct
 
4 of 8
5
Question

Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?

Correct
 
5 of 8
6
Question

You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?

Correct
 
6 of 8
7
Question

When restoring a backup, which of them is likely to be most time consuming to restore?

Correct


4
Question

You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?

Correct
 
4 of 7
5
Question

Refer to the following statements. Within the operation of the SNMP protocol, which of the following describes a MIB correctly?

  1. a database used for managing the entities in a communications network
  2. it has a hierarchical structure
  3. provides connectivity via SQL database queries and web interface capabilities

Correct
 
5 of 7
6
Question

You have added a new device to the network management application. What else should you add to the network management application to be able to control it?

Correct
3
Question

A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?

Correct
 
3 of 8
4
Question

What kind of information would you expect to find within a network device’s event log? [Choose all that apply].

Correct
 
4 of 8
5
Question

Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?

Correct
 
5 of 8
6
Question

To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?

Correct
 
6 of 8
7
Question

You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?

Correct
6
Question

Refer to the exhibit. Which of the following configuration is being displayed?

reference image for question

Correct
 
6 of 8
7
Question

Which of the following is true about Load balancing on a network?
1) Provides redundancy
2) Provides an increase in throughput
3) Increases CPU resources

Correct
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
CORRECT
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
CORRECT
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
CORRECT
What port do SNMP agents listen on?
CORRECT
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
CORRECT
What command requests the next record in an SNMP log?
CORRECT
When shopping for a new router, what does the MTBF tell you?
CORRECT
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
CORRECT
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
CORRECT
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
CORRECT


At what layer of the OSI model do proxy servers operate?
Correct
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Correct
Who is responsible for the security of hardware on which a public cloud runs?
Correct
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Correct
Which device would allow an attacker to make network clients use an illegitimate default gateway?
Correct
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
Correct
What information in a transmitted message might an IDS use to identify network threats?
Correct
Which policy ensures messages are discarded when they don't match a specific firewall rule?
Correct
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
Correct
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Correct
1
Question

You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?

Correct
 
1 of 6
2
Question

You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?

Correct
 
2 of 6
3
Question

You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?

Correct
 
3 of 6
4
Question

Which of the following versions of SNMP are considered unsecure? [Choose all that apply]

Correct
 
4 of 6
5
Question

You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?

Correct
5
Question

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?

Correct
 
5 of 10
6
Question

You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?

Correct
 
6 of 10
7
Question

You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?

Correct
 
7 of 10
8
Question

You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?

Correct
 
8 of 10
9
Question

You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?

Correct




























 










Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh