You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____
Correct
4 of 8
5
Question
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?
Correct
5 of 8
6
Question
You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?
Correct
6 of 8
7
Question
When restoring a backup, which of them is likely to be most time consuming to restore?
Correct
4
Question
You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?
Correct
4 of 7
5
Question
Refer to the following statements. Within the operation of the SNMP protocol, which of the following describes a MIB correctly?
a database used for managing the entities in a communications network
it has a hierarchical structure
provides connectivity via SQL database queries and web interface capabilities
Correct
5 of 7
6
Question
You have added a new device to the network management application. What else should you add to the network management application to be able to control it?
Correct
3
Question
A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?
Correct
3 of 8
4
Question
What kind of information would you expect to find within a network device’s event log? [Choose all that apply].
Correct
4 of 8
5
Question
Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?
Correct
5 of 8
6
Question
To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?
Correct
6 of 8
7
Question
You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?
Correct
6
Question
Refer to the exhibit. Which of the following configuration is being displayed?
Correct
6 of 8
7
Question
Which of the following is true about Load balancing on a network? 1) Provides redundancy 2) Provides an increase in throughput 3) Increases CPU resources
Correct
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
CORRECT
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
CORRECT
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
CORRECT
What port do SNMP agents listen on?
CORRECT
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
CORRECT
What command requests the next record in an SNMP log?
CORRECT
When shopping for a new router, what does the MTBF tell you?
CORRECT
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
CORRECT
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
CORRECT
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
CORRECT
At what layer of the OSI model do proxy servers operate?
Hide Feedback
Correct
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Hide Feedback
Correct
Who is responsible for the security of hardware on which a public cloud runs?
Hide Feedback
Correct
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Hide Feedback
Correct
Which device would allow an attacker to make network clients use an illegitimate default gateway?
Hide Feedback
Correct
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
Hide Feedback
Correct
What information in a transmitted message might an IDS use to identify network threats?
Hide Feedback
Correct
Which policy ensures messages are discarded when they don't match a specific firewall rule?
Hide Feedback
Correct
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
Hide Feedback
Correct
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Hide Feedback
Correct
1
Question
You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?
Correct
1 of 6
2
Question
You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?
Correct
2 of 6
3
Question
You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?
Correct
3 of 6
4
Question
Which of the following versions of SNMP are considered unsecure? [Choose all that apply]
Correct
4 of 6
5
Question
You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?
Correct
5
Question
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
Correct
5 of 10
6
Question
You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?
Correct
6 of 10
7
Question
You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?
Correct
7 of 10
8
Question
You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?
Correct
8 of 10
9
Question
You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?
Correct
Question
You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____
Correct
4 of 8
5
Question
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?
Correct
5 of 8
6
Question
You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?
Correct
6 of 8
7
Question
When restoring a backup, which of them is likely to be most time consuming to restore?
Correct
4
Question
You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?
Correct
4 of 7
5
Question
Refer to the following statements. Within the operation of the SNMP protocol, which of the following describes a MIB correctly?
a database used for managing the entities in a communications network
it has a hierarchical structure
provides connectivity via SQL database queries and web interface capabilities
Correct
5 of 7
6
Question
You have added a new device to the network management application. What else should you add to the network management application to be able to control it?
Correct
3
Question
A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?
Correct
3 of 8
4
Question
What kind of information would you expect to find within a network device’s event log? [Choose all that apply].
Correct
4 of 8
5
Question
Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?
Correct
5 of 8
6
Question
To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?
Correct
6 of 8
7
Question
You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?
Correct
6
Question
Refer to the exhibit. Which of the following configuration is being displayed?
Correct
6 of 8
7
Question
Which of the following is true about Load balancing on a network? 1) Provides redundancy 2) Provides an increase in throughput 3) Increases CPU resources
Correct
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
CORRECT
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
CORRECT
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
CORRECT
What port do SNMP agents listen on?
CORRECT
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
CORRECT
What command requests the next record in an SNMP log?
CORRECT
When shopping for a new router, what does the MTBF tell you?
CORRECT
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
CORRECT
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
CORRECT
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
CORRECT
At what layer of the OSI model do proxy servers operate?
Hide Feedback
Correct
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Hide Feedback
Correct
Who is responsible for the security of hardware on which a public cloud runs?
Hide Feedback
Correct
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Hide Feedback
Correct
Which device would allow an attacker to make network clients use an illegitimate default gateway?
Hide Feedback
Correct
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
Hide Feedback
Correct
What information in a transmitted message might an IDS use to identify network threats?
Hide Feedback
Correct
Which policy ensures messages are discarded when they don't match a specific firewall rule?
Hide Feedback
Correct
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
Hide Feedback
Correct
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Hide Feedback
Correct
1
Question
You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?
Correct
1 of 6
2
Question
You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?
Correct
2 of 6
3
Question
You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?
Correct
3 of 6
4
Question
Which of the following versions of SNMP are considered unsecure? [Choose all that apply]
Correct
4 of 6
5
Question
You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?
Correct
5
Question
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
Correct
5 of 10
6
Question
You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?
Correct
6 of 10
7
Question
You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?
Correct
7 of 10
8
Question
You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?
Correct
8 of 10
9
Question
You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?
Correct
Unit 9 Quiz
Which of the following is considered a secure protocol?
CORRECT
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
CORRECT
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
CORRECT
Which type of DoS attack orchestrates an attack using uninfected computers?
CORRECT
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
CORRECT
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
CORRECT
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
CORRECT
A spoofed DNS record spreads to other DNS servers. What is this attack called?
CORRECT
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
CORRECT
Which of these attacks is a form of Wi-Fi DoS attack?
CORRECT
Unit 10 Quiz
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
CORRECT
What kind of firewall blocks traffic based on application data contained within the packets?
CORRECT
Which of the following features is common to both an NGFW and traditional firewalls?
CORRECT
What feature of Windows Server allows for agentless authentication?
CORRECT
What software might be installed on a device to authenticate it to the network?
CORRECT
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
CORRECT
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
CORRECT
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
CORRECT
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
CORRECT
At what layer of the OSI model do proxy servers operate?
CORRECT
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
Hide Feedback
Correct
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Hide Feedback
Correct
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Hide Feedback
Correct
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Hide Feedback
Correct
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Hide Feedback
Correct
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.
Hide Feedback
Correct
Which of the following is considered a secure protocol?
Hide Feedback
Correct
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
Hide Feedback
Correct
What type of attack relies on spoofing?
[Deauth Attack is correct answer ]
Hide Feedback
Incorrect
4
Question
What does the acronym CIA stand for in relation to network security? [Choose all that apply]
Correct
4 of 9
5
Question
Which threat actor will have prior knowledge of the network layout to perform a malicious attack?
Correct
5 of 9
6
Question
What is the purpose of Role-based Access Control (RABC)?
Correct
6 of 9
7
Question
Where in a network segment will the DMZ be located?
Correct
7 of 9
8
Question
Which of the following can be used for multi-factor authentication? [Choose all that apply]
Correct
3
Question
You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?
Correct
3 of 8
4
Question
You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?
Correct
4 of 8
5
Question
You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?
Correct
5 of 8
6
Question
A password policy as part of a network user agreement may require users to do which of the following? [Choose all that apply].
Correct
6 of 8
7
Question
Why would an attacker perform a brute force attack?
Correct
2
Question
Which of the following commands do you need to run in order to scan the PLABWIN10 devices?
Correct
2 of 6
3
Question
From the MBSA scan performed in Task 3, how many users have non-expiring passwords?
Correct
3 of 6
4
Question
After performing the MBSA scan from the Command Line in task 4, how many user accounts have blank or simple passwords?
Correct
4 of 6
5
Question
When executing the mbsacli command, what does the /r function perform?
Correct
4
Question
Your organization’s network has multiple layers of security devices. When you attempt to connect to a service on the Internet. However, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?
Correct
4 of 6
5
Question
Refer to the exhibit. Which of the following networking device is being shown in the middle in red color?
Correct
1
Question
Which of the following are characteristics of the MTU when applied to IP and Ethernet networks? [Choose all that apply.]
Correct
1 of 6
2
Question
Your network comprises of multiple switches and a single router. Currently, all users of finance and marketing on the third floor are connected to a flat switch. You must segregate traffic between your finance and marketing groups. You need to ensure that critical finance information can flow without delay to the finance users and ensure additional level of security. What should you do?
Correct
2 of 6
3
Question
When a switch receives data on one of its ports, what is the next step does it perform?
Correct
3 of 6
4
Question
Identify the correct statement for a switch’s MAC Address Table. It is possible to have more than one MAC address corresponding to a single port. It is possible to have more than one port corresponding to a single MAC address.
Correct
4 of 6
5
Question
While examining frames on the network using a packet analyzer, you observe several frames that are double tagged. What kind of attack could a host on the network be performing that may result in this?
Correct
1
Question
Which of the following IP network configuration elements a DHCP server, running on Windows Server 2012, can provide to a Windows 10 system? [Choose all that apply.]
Correct
1 of 4
2
Question
Refer to the exhibit. Which of the following type of attack is being depicted?
Correct
2 of 4
3
Question
Which of the following can be prevented if DHCP snooping is implemented on a switch? [Choose all that apply].
Correct
Which OSI layer is responsible for directing data from one LAN to another?
Hide Feedback
Correct
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Hide Feedback
Correct
When a router can't determine a path to a message's destination, where does it send the message?
Hide Feedback
Correct
A routing protocol's reliability and priority are rated by what measurement?
Hide Feedback
Correct
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?
Hide Feedback
Correct
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Hide Feedback
Correct
What kind of device can monitor a connection at the demarc but cannot interpret data?
Hide Feedback
Correct
What specifications define the standards for cable broadband?
Hide Feedback
Correct
What method does a GSM network use to separate data on a channel?
Hide Feedback
Correct
Which of these cellular technologies offers the fastest speeds?
Hide Feedback
Correct
4
Question
Refer to the exhibit. Which authentication protocol is shown in this exhibit?
Correct
4 of 7
5
Question
Which of the following types of authentication and access control does not need an external AAA server to verify credentials inputted by users?
Correct
5 of 7
6
Question
Which of the following types of authentication will continue to function even if network connectivity to any available AAA servers is lost?
Correct
What kind of network is the PSTN?
CORRECT
What kind of device can monitor a connection at the demarc but cannot interpret data?
CORRECT
Where does an MPLS label go in a PDU?
CORRECT
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
CORRECT
How many channels are in an ISDN PRI connection?
CORRECT
What method does a GSM network use to separate data on a channel?
CORRECT
Which DSL standard has the fastest speeds immediately outside the CO?
CORRECT
An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
CORRECT
______________ in SONET are analogous to the ________________ of T-carriers.
CORRECT
What specifications define the standards for cable broadband?
CORRECT
Which type of address uses 12 hexadecimal digits? (Choose two.)
CORRECT
Which of the following is the PDU used by a connection-oriented Transport layer protocol?
CORRECT
Which cell phone technology uses a spread-spectrum technique that uses codes on the packets to keep calls separated?
CORRECT
You need to implement software that can manage virtual machines and manage resource sharing between a host computer and guest VMs. What should you implement?
CORRECT
A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has been told that all Internet access should go through a single computer so incoming and outgoing traffic can be screened and only that computer should have an address revealed to the Internet. What should the administrator set up?
CORRECT
After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices on the LAN. He verifies that the IP address and subnet mask are in the correct IP subnet. While the technician is troubleshooting, another user complains that she can no longer access the network. No other users seem to be having any problems. What could be the cause of the problem?
CORRECT
Which of the following best describes the IEEE 802.11b standard?
CORRECT
Which authentication protocol uses PKI to provide mutual authentication?
CORRECT
The Webmaster for a company installed a certificate on a Web server to provide secure communication between the Web server and Web browsers. What protocol will be used to provide a secure channel?
CORRECT
A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?
CORRECT
Your company is using standard structuring cabling techniques. You need a spreadsheet created that tells you which switch port in the IDF each PC is plugged into. Which of the following will help you with this task? (Choose two.)
CORRECT
You have been asked to install a physical security control that will prevent unauthorized users from accessing the server room. Which of the following should you install?
CORRECT
Which protocol is most likely used to communicate with a SAN over an Ethernet LAN using standard NICs?
CORRECT
You are a network administrator for a company that has two buildings. You are setting up a wireless network so users can maintain a network connection as they move between buildings. What should you be sure to configure on your WAPs to give the wireless users the best mobile experience?
CORRECT
A company negotiates with a service provider for Frame Relay service. At the conclusion, the company and service provider sign an agreement specifying the bandwidth and the availability of the service. What document was signed?
CORRECT
You have been called to terminate a DS3 connection at a customer site. What type of connector should you bring to terminate the copper cable?
CORRECT
Which type of Internet connection can provide an unshared connection over regular telephone lines operating with at least 1 Mbps of bandwidth?
CORRECT
One of your clients is adding several computers to a guest waiting area. They have asked you to ensure that inappropriate websites cannot be accessed from those computers. What should you configure?
CORRECT
A technician has run an MMF cable from the IDF to the MDF and is not getting a strong signal. He needs to check the length of the cable and see if there are any breaks or mismatched connectors. What should he use?
CORRECT
When two or more WAPs are installed in close proximity, what must be different on each WAP to avoid problems?
CORRECT
A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular website. What has occurred?
CORRECT
Which of the following is a private IP address?
CORRECT
Your boss has asked you to run an Nmap scan on all the routers on one of your subnets. What is your boss looking for?
CORRECT
One morning you come into work and find that one of your servers has been attacked by malware. All the security patches are up-to-date. After doing some investigating and research, you cannot find any information about the nature of the attack or the server vulnerability that allowed it. What are you most likely experiencing?
CORRECT
MMF cable runs from a company datacenter to a workgroup switch that has 16 RJ-45 ports. A connection must be made from the MMF cable to the switch. What is necessary?
CORRECT
Which of the following is found in the intermediate distribution frame and is used to terminate cabling coming from the work area?
CORRECT
You need to ensure that customers have access to your public web servers in the event of a disaster such as a power outage or a failed server. What do you need to implement on your network?
CORRECT
You have been asked to install a device that supports WPA2 and 802.11ac. What device should you install?
CORRECT
While investigating a problem with a router, the show interface command reports line protocol down on the Ethernet port. A Cat5e cable is plugged into the port and is connected to another router's Ethernet port about 80 meters down the hall. Both routers are turned on and configured correctly. The cable is terminated using the TIA/EIA 568A standard on both ends and was tested with a cable certifier. What would solve the problem?
CORRECT
A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the applications they are running are still critical. The administrator wants to consolidate the older servers into about five servers while maintaining isolation among the applications. What should the administrator implement?
CORRECT
A network technician has been asked to make a connection between two switches in an IDF and MDF using 1000BaseSX Ethernet. The IDF and MDF are about 85 meters apart. The technician brings an adequate length of Cat6a cable to make the connection but finds that he is unable to make a connection. What is the problem?
CORRECT
You are planning to configure a voice and video system that will use TCP/IP. You need to study the protocols and devices you might be using to deploy the system. Which of the following are you likely to study? (Choose two.)
CORRECT
A user is unable to connect to a server with address 172.21.100.100. A technician troubleshooting the problem enters the ipconfig command and sees the output shown below. What should be done to resolve the problem?
Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the machine shop was closed. The network is using 1000BaseT switches and all the NICs are 1000BaseT compatible. The longest run of cable is 85 meters. All cabling was certified and network connectivity was verified. On Monday, the users of the computers report very slow network performance and the switch reports CRC errors. What is the most likely reason for the problems?
CORRECT
Which type of cable should you use if you need to support up to 10 Gbps bandwidth at a distance of 85 meters using RJ45 connectors?
CORRECT
A recent audit has prompted a lengthy search for the whereabouts of high-value equipment. While the equipment was eventually found, you want to ensure that you don't have to waste time in the future searching for your equipment. What can you put in place to keep track of your equipment?
CORRECT
Which device uses CSMA/CD when the interface is set to half duplex mode?
CORRECT
You want to implement a system that uses certificates for identity verification and secure key management. What type of system do you need to implement?
CORRECT
Which of the following works over two copper wire pairs, uses TDM, and transmits at 1.544 Mbps?
CORRECT
You are configuring some new network printers and you want to be sure the printers are always dynamically assigned the same IP address. What should you configure?
CORRECT
One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, reliable Internet access. You have been asked to connect the branch office with the main office with a secure connection that uses their existing network infrastructure. What do you recommend?
CORRECT
You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?
CORRECT
Which layer of the OSI model should you examine if you want to troubleshoot a problem with the HTTP protocol?
CORRECT
You are familiar with SSH and are happy with the level of security it provides. You want similar secure communication for file transfers on your network. What should you use?
CORRECT
Which TCP/IP protocol has only these fields in its header: Source port, Destination port, Length, and Checksum?
CORRECT
A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do?
CORRECT
You need to perform out-of-band management on a router. How should you connect to the router?
CORRECT
Which device is used to detect suspicious packets and provides information about possible violations to a management station?
CORRECT
Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?
CORRECT
Which technology allows multiple signals to travel simultaneously over one medium?
CORRECT
A user transfers several MP3 files from her smartphone to her laptop computer using Bluetooth. What type of network infrastructure is she using?
CORRECT
You have been tasked with hardening some of the routers and switches on your network. Currently, your network administrators use telnet to remotely manage the devices. What can you do to make those devices more secure?
CORRECT
What type of connector is used with an SFP port?
CORRECT
A network technician is meeting with a representative of an ISP to inspect the facility where a new WAN connection will be made. Where should the technician meet the representative?
CORRECT
Which device should you install that will give your mobile users secure remote access to the company servers through the public Internet?
CORRECT
You have been asked to examine the status of antivirus software, security patches, and open ports. When you are finished, you should provide a report of your findings. What have you been asked to perform?
CORRECT
Recent police reports suggest that unsavory individuals have been casing the neighborhood where your company is located. You want to ensure that an alarm is triggered in the event someone is detected roaming the premises after business hours. What are you most likely to deploy?
CORRECT
Which of the following is a valid example of an IPv6 link local address?
CORRECT
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need?
CORRECT
Which networking model should you use to allow the users on each computer to control access to their own shared folders and printers without centralized control?
CORRECT
A network technician is asked to send ICMPv6 packets to the IPv6 loopback address on her computer. What command will the technician use?
CORRECT
While installing routers between two buildings, a technician must configure an IPv4 address on both routers using a subnet mask that will yield only the required IP addresses. What should the technician use for the subnet mask, expressed in CIDR notation?
CORRECT
You have recently implemented a new WAN technology to connect a remote branch office to your headquarters. While making VoIP calls between the offices, employees complain about delays between someone talking and the other party hearing what they've said. Which WAN technology is most likely to cause this apparent latency?
CORRECT
Which of the following is an authentication protocol that encrypts the username, authorization, and accounting information, works only over TCP, and was developed by Cisco?
CORRECT
You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?
CORRECT
You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that run the conferencing client application receive packets related to the videoconference. You need to assign an address to the videoconferencing application. Which of the following addresses is appropriate?
CORRECT
You have just finished configuring a router on your corporate network that consists of several subnets. Some users have informed you that they have access to some of the servers, but not others that they used to have access to. What is the most likely reason for this problem?
CORRECT
Which of the following devices works with frames and MAC addresses and supports STP?
CORRECT
You have recently set up a new Windows server and have configured the Administrator account with a strong password. What else should you do to make the new server more secure?
CORRECT
A network administrator wants to provide backup power for his datacenter. He will be using a generator. What type of power does a generator produce and what other component is needed to provide the type of power required for a datacenter?
CORRECT
Which of the following separates multiple signals on the same medium by using time slots where each time slot carries data to a different destination or carries a different type of data to the same destination?
CORRECT
You are planning on a redesign of your network that will involve adding two VLANs and reconfiguring some IP subnets. What should you do first?
CORRECT
A startup company has an idea for a new medical records application. The company wants to develop the application so it can be run on multiple OSs. However, they have limited funds to build the development environment that is necessary to create and test the application properly. What service should they consider?
CORRECT
You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you investigate?
CORRECT
A number of computers have been reported to be getting incorrect IP addresses. After doing some investigating, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next?
CORRECT
You need to provide a method to ensure that sensitive files downloaded from your servers can be verified for integrity. Which of the following solutions can you deploy?
CORRECT
While interviewing a user that has reported trouble accessing a server, you determine that other users on the LAN have no problem accessing the server. What question should you ask next?
CORRECT
While cleaning loose-tube fiber-optic cables, a technician gets some of the cleaning solvent near his eyes. Which of the following should the technician check to see how to deal with the problem?
CORRECT
You need to be able to create rules to filter packets and protect against attacks from the Internet. What type of device should you use?
CORRECT
While setting up a new network, a technician connects two switches together using a Cat6 straight-through cable. The switch ports are configured for 1000BaseT Ethernet, full-duplex, and do not support auto-MDIX. After making the connection, the link status light for both ports remains off. What is the most likely problem?
CORRECT
A network has four switches, each with twenty computers connected to the switch ports. Each set of twenty computers been assigned a different IP network number. What is required for all computers to communicate with each other?
CORRECT
You are configuring an AP for a WLAN. You want to use the strongest encryption supported by the device. Which of the following should you choose?
CORRECT
To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the technician configure?
CORRECT
You arrive at a customer site to resolve a problem with a router. After logging on to the router, you find that it uses a different operating system than the routers you are familiar with. Which troubleshooting step should you take next?
CORRECT
A user's computer is redirected to an attacker's server after the attacker transmitted several frames onto the network. After some investigation, you have found that the user's computer had an incorrect mapping of an IP address to a MAC address. What type of attack took place?
CORRECT
While using a protocol analyzer, you see a packet with UDP source port 68 and destination port 67. What are you seeing?
CORRECT
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems?
CORRECT
You've arrived on site to a WAN installation where you will be performing maintenance operations. You have been told the WAN protocol in use allows multiple Layer 3 protocols and uses routers that use labels in the frame headers to make routing decisions. What WAN technology is in use?
CORRECT
The default VLAN on a switch has been assigned an IP address of 172.19.0.64/27 with a default gateway of 172.19.0.94. You can't ping the switch from your workstation that has the address 172.19.0.66/27 but you can ping your default gateway that has the address 172.19.0.94. Why can't you ping the switch?
CORRECT
Which of the following is associated with SNMP software? (Choose two.)
CORRECT
1
Question
You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode?
Correct
1 of 6
2
Question
What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames?
Correct
2 of 6
3
Question
You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance?
Correct
3 of 6
4
Question
What is the key drawback of STP or per VLAN STP – PVST?
Correct
4 of 6
5
Question
You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports?
Correct
5 of 6
2
Question
In which type of cloud configuration is the customer responsible for maintaining the operating system and software?
Correct
2 of 7
3
Question
When choosing the location to create resources in the cloud, what is the best location for the resources? [Choose all that apply]
Correct
3 of 7
4
Question
With a _________ Cloud, the hardware and software are maintained by the company that owns it.
Correct
4 of 7
5
Question
Which of the following is an example of Software as a Service (SaaS)? [Choose all that apply]
Correct
5 of 7
6
Question
What is the advantage of elasticity when utilizing a cloud service provider? [Choose all that apply]
Correct
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?
Hide Feedback
Correct
Check My Work
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?
Hide Feedback
Correct
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?
Hide Feedback
Correct
With which network connection type does the VM obtain IP addressing information from its host?
Hide Feedback
Correct
Which type of switch connects all devices in a rack to the rest of the network?
Hide Feedback
Correct
Which cloud service model gives software developers access to multiple platforms for testing code?
Hide Feedback
Correct
When shopping for a new router, what does the MTBF tell you?
Hide Feedback
Correct
What information does the switchport port-security command use to restrict access to a switch's interface?
Hide Feedback
Correct
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Hide Feedback
Correct
Which cloud management technique executes a series of tasks in a workflow?
Hide Feedback
Correct
1
Question
Which tier in the three-tiered network is responsible for routing traffic in and out of a network?
Correct
1 of 6
2
Question
At which layer in Software Defined Network (SDN) will you find a firewall?
Correct
2 of 6
3
Question
How many tiers are there in the spine and leaf network architecture?
Correct
3 of 6
4
Question
The traffic that enters into a network is known as the ___________ traffic.
Correct
4 of 6
5
Question
Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?
Correct
2
Question
What is the purpose of implementing a DHCP server on a network? [Choose all that apply]
Correct
2 of 7
3
Question
After installation of the DHCP server role, why is it necessary to restart the DHCP service?
Correct
3 of 7
4
Question
What is the functionality of a lease for a DHCP server?
Correct
4 of 7
5
Question
When creating a scope on a DHCP server, what is the purpose of specifying an exclusion?
Correct
5 of 7
6
Question
On which server will the DHCP server role normally be installed?
Correct
Question
Which of the following is a Class C Private IP address?
192.168.0.10
172.16.0.12
10.0.0.1
169.254.1.5
Correct
4 of 9
5
Question
What is the Subnet Mask for a Classful Class A IP range?
255.255.255.0
255.0.0.0
255.255.0.0
255.255.255.254
Correct
5 of 9
6
Question
What would the subnet mask be of the following network range?
192.168.1.0/28
255.255.255.0
255.255.255.192
255.255.255.240
255.255.0.0
Correct
6 of 9
7
Question
Which of the following is the Loopback address for IPv4?
10.0.0.1
127.0.0.1
172.16.0.1
192.168.0.1
Correct
7 of 9
8
Question
What is the functionality of a Multicast IP address?
Sends network communication to only a specific host
Sends network communication to a specific set of hosts
Sends network communication to all hosts on the network
Sends network communication to the default gateway
4
Question
Which of the following Stratum Levels is the least Trusted?
Correct
4 of 9
5
Question
Which of the following command-line commands would display time sync information for an NTP client?
Correct
5 of 9
6
Question
6
Question
What is the maximum number of NTP Servers that an NTP client can be synchronized with?
Correct
7
Question
Which of the following port is used by NTP Servers to provide time synchronization?
Correct
7 of 9
8
Question
Which Transport Layer protocol is used by NTP Servers to provide time synchronization?
Correct
Which part of a MAC address is unique to each manufacturer?
Hide Feedback
Correct
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?
Hide Feedback
Correct
What decimal number corresponds to the binary number 11111111?
Hide Feedback
Correct
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
Hide Feedback
Correct
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
Hide Feedback
Correct
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
Hide Feedback
Correct
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
Hide Feedback
Correct
Which type of DNS record identifies an email server?
Hide Feedback
Correct
Which of these commands has no parameters in Windows?
Hide Feedback
Correct
which DNS server offers the most current resolution to a DNS query?
What transport protocol/ports do DNS and DHCP use?
Correct
5
Question
You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.
Correct
4
Question
You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?
3
Question
HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?
Correct
3 of 8
Lab Assessment
Test your knowledge on the topics covered in this lab by completing the review questions below.
4
Question
To be able to remotely manage a Windows device securely, which of the following protocols can be used?
Correct
4 of 9
5
Question
Which of the following connection methods can be used to connect a company’s offices which are located in different geographical areas?
Correct
5 of 9
6
Question
While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?
Correct
6 of 9
7
Question
Which permission needs to be assigned to a user to be able to connect to a VPN connection?
Correct
7 of 9
8
Question
Which permission allows a user access to a resource?
Correct
8 of 9
Action item
Live Virtual Machine Lab 4.3: Module 04 Network Command Line Tools
3. Question
Actioned
Item completed: 01/20/2022 06:26 AM
Value: 1
Answer: -t
PASS
4. Question
Actioned
Item completed: 01/20/2022 06:26 AM
Value: 1
Answer: ifconfig eth0 ip address show eth0
PASS
5. Question
Actioned
Item completed: 01/20/2022 06:26 AM
Value: 1
Answer: Displays address resolution table for the device
PASS
6. Question
Actioned
Item completed: 01/20/2022 06:27 AM
Value: 1
Answer: The route it will take to reach the destination IP address
PASS
Score : 5 out of 5 (100%)
Live Virtual Machine Lab 4.1: Module 04 Network Services and Protocols
3. Question
Actioned
Item completed: 01/20/2022 05:58 AM
Value: 1
Answer: 80 and 443
PASS
4. Question
Actioned
Item completed: 01/20/2022 05:59 AM
Value: 1
Answer: LDAP
PASS
5. Question
Actioned
Item completed: 01/20/2022 05:59 AM
Value: 1
Answer: SQL
PASS
6. Question
Actioned
Item completed: 01/20/2022 05:59 AM
Value: 1
Answer: POP3 was used on the mail client software
PASS
7. Question
Actioned
Item completed: 01/20/2022 05:59 AM
Value: 1
Answer: UDP 53 / UDP 67 and 68
PASS
Which protocol's header would a layer 4 device read and process?
Hide Feedback
Correct
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Hide Feedback
Correct
At which OSI layer does IP operate?
Hide Feedback
Correct
Check My Work
What is the Internet standard MTU?
Hide Feedback
Correct
Which two protocols manage neighbor discovery processes on IPv4 networks?
Hide Feedback
Correct
What is one advantage offered by VDI over RDS and VNC?
Hide Feedback
Correct
Which encryption protocol does GRE use to increase the security of its transmissions?
Hide Feedback
Correct
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Hide Feedback
Correct
Which remote file access protocol is an extension of SSH?
Hide Feedback
Correct
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?
Hide Feedback
Correct
How many bits of a class A IP address are used for host information?
Hide Feedback
Correct
What is the formula for determining the number of possible hosts on a network?
Hide Feedback
Correct
Which of the following is not a good reason to segment a network?
Hide Feedback
Correct
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?
Hide Feedback
Correct
What do well-chosen subnets accomplish?
Hide Feedback
Correct
Which formulas can be used to calculate the magic number? Choose two.
Hide Feedback
Correct
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
Hide Feedback
Correct
Which assignment technique requires a RADIUS server?
Hide Feedback
Correct
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Hide Feedback
Correct
Which IEEE standard determines how VLANs work on a network?
Hide Feedback
Correct
Simulation Lab 8.2: Module 08 Configure VLANs Using a Switch's GUI
Answers
1. 28
2. 1.0.1.4
3. 10
4. 1
Godwin Pharmaceuticals has a private web server for
its corporate network that runs on a Linux operating system. You have been
contacted to make its network remotely accessible to the IT department so that
the IT department can have secure access to the workstations and, at the same
time, the transmissions remain encrypted. Which of the following protocols
would you apply so that the employees can have secured remote access to the
computer server?
a. Telnet
b. SSH
c. POP3
d. RDP
Answer: SSH
Whistle Blowers, a talent management company, wants
to set up a network connection for its branch office in Los Angeles. It has
contracted Vince Cabling Solutions for this. The administration department of
Whistle Blowers has specifically mentioned that the nodes of the devices used
in the division should all be connected through a common cable so that the
material costs can be minimized. Analyze which topology Vince Cabling Solutions
should use in such a scenario.
a. A mesh topology
b. A bus topology
c. A star topology
d. A ring topology
Answer: BUS
JK Fabrics has contracted you to set up a unit for
storing the routers and various switches that are to be used in setting up the
network connection. Which of the following do you think is ideally suited in
this scenario?
a. Racks
[Answer]
b. Patch panel
c. VoIP
d. IDF
Which of the following documents defines the terms
of future contracts between parties, such as payment terms or arbitration
arrangements?
a. SLA
b. SOW
c. MSA[Answer]
d. MOU
The University of Bethesda has requested your
professional help in giving a masterclass on how to use Telnet ports for
interacting with remote computers. Which of the following ports will you open
to teach students how to establish an unencrypted connection with a remote
computer?
a. 23 [Answer]
b. 80
c. 443
d. 22
Which of the following command-line tools is used
to query DNS name servers for information about host addresses and other DNS
records?
a. ip
b. ping
c. ipconfig
d. dig [Answer]
Which of
the following fields in a TCP segment identifies the data segment's position in
the stream of data segments being sent?
a.
Sequence number [Answer]
b. Source port
c. Acknowledgment number
d. Reserved
You have been appointed as the network
administrator of an ISP. Your first project requires you to develop a protocol
that can transmit IP and other kinds of messages through a tunnel so that you
can connect two VPN endpoints. Which of the following will you choose in this
scenario?
a. GRE[Answer]
b. OpenVPN
c. L2TP
d. IKEv2
You have
recently been hired to complete a pending networking project where the cabling
procedure providing Fast Ethernet has already been completed. On inspection,
you realize that TIA/EIA-568 Category 5 twisted pair has been used for the
cabling procedure. What is the maximum bandwidth that you will allot with such
a pair of wires in this scenario?
a. 10 Gbps
b. 100 Mbps (Fast Ethernet)[Answer]
c. 1000 Mbps (1 Gbps, Gigabit Ethernet)
d. 10 Mbps
The IT
department of Maddison Corporates has complained about a faulty fiber-optic
cable as a result of which it is having connectivity issues within the
organization. As a network engineer, you want to detect the faulty cable by
searching for electrical signals in the cables located within the racks in the
data room. Which of the following instruments will you need in this scenario?
a. Tone generator
b. Tone locator[Answer]
c. TDR
d. OPM
The head office of Vojks Telecommunications runs on
a standard WLAN network, and it has hired Jim as a network administrator to
upgrade its network to faster standards. On inspection, Jim realizes that a
throughput of 50 Mbps should be sufficient for the smooth functioning of the
office. The only request Vojks has made to Jim is to ensure that the older
computers still have wireless access during the upgrade. Analyze which of the
following standards Jim should use in this scenario.
a. 802.11a
b. 802.11g[Answer]
c. 802.11n
d. 802.11b
Which of the following security threats requires a
PIN (personal identification number) to access an AP's settings or to associate
a new device with a network?
a. WPS attack[Answer]
b. War chalking
c. War driving
d. WPA attack
You have
been hired as an assistant to the head network administrator in an ISP
(Internet service provider). He wants you to disable the STP (Spanning Tree
Protocol) in the demarc port of one of the clients in order to prevent the
ISP's WAN topology from mixing with the corporate network's topology. Which of
the following will you use in this scenario to complete the task at hand?
a. A root bridge
b. A BPDU filter[Answer]
c. A root guard
d. A BPDU guard
Which cloud characteristic allows resources to be
changed quickly and dynamically, even automatically in response to changing
demands?
a. Rapid elasticity [Answer]
b. Broad network access
c. Resource pooling
d. Measured service
Probiotic
is a company that sells packaged milk through online portals. Recently, the
company received a generous funding with which it plans on establishing a
separate floor for the Finance department within the building. The network
administrator requests you to submit a network document after subdividing the
smaller network for Finance into a separate network segment so that the
transmissions in broadcast domains are limited to each network and there is
less possibility of hackers or malware reaching remote, protected networks in
the enterprise domain. Identify under which of the following groupings will you
place this network segment in this scenario?
a. Device types
b. VLAN groups
c. Departmental boundaries[Answer]
d. Geographic locations
In the
formula 2h – 2 = Z, what does h represent?
a. h equals the number of bits
remaining in the host portion.
[Answer]
b. h equals the number of bits
that must be switched from the host address to the network ID.
c. h equals the number of
hosts available in each subnet.
d. h equals the
number of subnets that result.
Mojaro Bank at Datona has contacted Vincent, a
network provider, to provide Mojaro with a network connection that will enable
it to securely conduct financial transactions with the other branches situated
across various states in the United States as well as with the International
Monetary Fund. Analyze which of the following connections would be best suited
in this scenario.
a. LAN
b. CAN
c. WAN[Answer]
d. MAN
A client has complained of losing Internet
connectivity. You as a network engineer troubleshoot the error, and you find
that the source of the error is the computer's wired connection. You decide to
solve the issue by replacing the wired connection with a wireless one. What
kind of an issue are you resolving in this scenario?
a. Interface errors[Answer]
b. DNS issues
c. Interference
d. Router misconfiguration
In which of the following forms of attack can
security flaws allow unauthorized users to gain access to the system?
a. On-path attack
b. DNS poisoning
c. Deauth attack
d. Back doors [Answer]
Jasmine has been working as the chief accountant
for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network
administrator, has recently discovered that Jasmine is actually the same person
who creates as well as authorizes the vendor account payments. Analyze if any
of the following agreements has been violated in this scenario.
a. AUP
b. PUA[Answer]
c. Anti-malware policy
d. NDA
Neon Printers has set up a full network of laptops
for the purpose of running multiple printing projects simultaneously. It has
contracted Theo Solutions to provide network security solutions while
protecting its network from certain traffic. Analyze which of the following is
best applicable in this scenario.
a. Using an HIDS
b. Using a network-based firewall [Answer]
c. Using a host-based firewall
d. Using a proxy server
You are a network manager who wants to distribute sensitive
privileges and responsibilities to different persons so that no single person
can singlehandedly compromise the security of data and resources. Which
authorization method will you apply in this scenario?
a. DAC
b. SoD [[Answer]
c. RBAC
d. MAC
Nathan, a network engineer, has been contracted by
a company to fix an error that has led to an increase in network latency during
conference calls with various clients. Analyze the way to correctly diagnose
this issue.
a. By checking the interface statistics of the
network
b. By calculating the error rate
c. By checking if the connection has any jitter
[Answer]
d. By checking if the network is operating at
maximum capacity
Michigan Tires has hired you as a network administrator
to monitor the network and to ensure that the network functions reliably. You
will require a device to monitor the CPU temperatures of your servers. Which of
the following software will you request from the management?
a. PRTG dashboard by Paessler [Answer]
b. Spiceworks
c. Room Alert Monitor by AVTECH
d. Wireshark
1. A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To
what location do you take them?
Answer: the entrance facility
2. A transceiver was recently damaged by a lightning strike during a storm. How might you
decide whether the ISP is responsible for replacing this device, or whether your company must
foot the bill?
Answer: Look at whether the device is located on the ISP's side of the demarc.
3. Which of the following devices are you likely to find in the MDF? Choose all that apply.
Answer: Routers, Switches, and KVM switch
4. Which device converts signals from a campus's analog phone equipment into IP data
that can travel over the Internet?
Answer: VoIP gateway
5. If you're shopping for a rack switch, what component on the switch tells you it can be
mounted to a rack?
AnswerRack ears
6. You need to connect a new network printer to a nearby wall jack. What kind of cable
should you use?
Answer: Patch cable
7. Nmap is used to map the networks and To apply Nmap scan on our network, we will use the
following Apps:
Answers:
Zenmap
Command Prompt
PowerShell
8. What type of diagram shows a graphical representation of a network's wired
infrastructure?
Answer: Wiring Schematic
9. Which of these is considered a secure place to store a list of documented network
passwords?
Answer: A password manager
10. What is the first step of inventory management?
Answer: List all components on the network
Which of the following networking device can be used to implement access lists, dynamic
routing protocols, and Network Address Translation (NAT)?
Hub
Router
Layer 3 Switch
Layer 2 Switch
On which of the following device can you not assign an IP address?
Router
Hub
Layer 3 Switch
Load Balancer
Which of the following are the benefits of a Wireless LAN Controller? [Choose all that apply]
Centralized logging
Centralized update deployment
Interference detection
Wireless access point status detection
Simplified wireless network maintenance
Flexible deployment of a wireless access point
Lab Assessment
Test your knowledge on the topics covered in this
lab by completing the review questions below.
3
Question
Which layer of the
OSI model is used to forward packets on the network?
Physical
Data Link
Transport
Session
Network
Correct
3 of 8
4
Question
Which of the
following is a function of the Presentation layer of the OSI model?
Handles
the processing and converting of data
Ensures physical
communication between devices
Delivers data
across network connections
Manages the flow
of data across the network
Correct
4 of 8
5
Question
Which layer of the
OSI model maps to the Internet layer of the TCP/IP model?
Network
Data Link
Application
Transport
Correct
5 of 8
6
Question
What is the functionality
of data encapsulation? [Choose all that apply]
Adds
headers to the data that is sent across the network
Ensures
security and reliability of data transmission
Converts electrical pulses
to binary data
Assigns a MAC address to a
host
Correct
6 of 8
7
Question
At which layer of
the OSI model does a router function?
Layer 1
Layer
3
Layer 2
Layer 4
Correct
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
a. HTTP
b. HTTPS
c. TLS
d. SSL
Hide Feedback
Correct
Which two encryption protocols might be used to provide secure transmissions for email services?
a. HTTP and HTTPS
b. SSH and RDP
c. FTP and SFTP
d. SSL and TLS
Hide Feedback
Correct
Which of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Ngnix
d. Microsoft Exchange Server
Hide Feedback
Correct
•Check My Work
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
a. Test the theory to determine the cause.
b. Establish a plan of action to resolve the problem and identify potential effects [Wrong].
c. Document findings, actions, outcomes, and lessons learned. [Wrong]
d. Identify the problem.
Hide Feedback
Incorrect
In the event of a fire, the most appropriate failure policy is a _______ policy.
a. Shutdown
b. Fail-close
c. Fail-open
d. Power-off
Hide Feedback
Correct
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
a. Hybrid
b. Ring
c. Hub-and-spoke
d. Peer-to-peer
Hide Feedback
Correct
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
a. Hybrid
b. Peer-to-peer
c. Hub-and-spoke
d. Client-server
Hide Feedback
Correct
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a. Client-server
b. Mesh
c. Star
d. Hub-and-spoke
Hide Feedback
Correct
•Check My Work
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
a. SQL
b. TLS
c. SMTP
d. FTP
Hide Feedback
Correct
Which of the following is an application layer protocol?
a. RDP
b. IP
c. TCP
d. Apache
Hide Feedback
Correct
Carlos
has just created a new subnet for the finance department. He needs to be able
to allow the employees in finance to retrieve files from the sales server,
which is located in another subnet. Which of the following OSI model layers
would it be necessary to categorize the device into?
a. Layer 4
b. Layer 6
c. Layer 2
d.
Layer 3
All of the cubicles in a company's office have
cables that run up to the ceiling and across to an IDF. Inside the IDF, they
connect directly to the latest generation switch available from the networking
equipment vendor that they have chosen. Which of the following describes the
physical topology most likely in use?
a. mesh
b. bus
c. star
d. ring
Which of
the following protocols might someone use to send an email?
a. SMTP
b. FTP
c. HTTP
d. RDP
Kumail
wants to check his bank account balance to see if a transaction has cleared
from a purchase he made the previous day. Which of the following protocols
would most likely be used to do this?
a. FTP
b. HTTP
c. RDP
d.
HTTPS
The network administrator for an organization needs
to install a network at his company's new branch office. The branch office will
have 30 computers that will all connect to the Internet, where they will share
a single public IP address. Which of the following devices must the network
administrator install to ensure the devices are able to send traffic out to the
Internet and receive the corresponding traffic back?
a. hub
b. router
c. token ring
d. switch
Dahlia has just installed gigabit routers and
switches at the company's headquarters. Which of the following might she need
to do in order to allow the computers that came with 10/100 network ports to
transfer data at the faster speeds?
a. Issue new tokens to each user
b. Install a NIC on each of the computers
c. Install a hub at each user's workstation
d. Configure the routers to push out updates to
the computers advertising the new speeds
Sandra is
attempting to resolve an issue on her company's network: several users are
unable to access one of the company's intranet web servers. She has developed a
theory and tested it to determine the cause. Which of the following steps
should she complete next?
a. Document
findings, actions, and outcomes
b. Implement
the solution or escalate the problem
c. Identify the problem and its symptoms
d. Establish a plan for resolving the problem
Which of the following statements stands true?
a. FTP servers provide secure encryption for file transfer.
b. An email can be downloaded to the client computer using POP3.
c. HTTP is a secured protocol that provides
secure transmission.
d. The DBMS does not support a multiuser
environment
Which of
the following network devices does not fall under the category of "end
devices" as certified by CISCO?
a. File server
b. Router
c. Network printer
d. Smartphone
Kyle is a property consultant, and he has hired you
as a programmer to make an application that sends data regarding property sites
to his client's base. He has also asked you to ensure that the application
should check whether the data has been received and if not, it should resend
the data. Which of the following protocols would you apply in such a scenario?
a.
Transmission Control Protocol
b. Internet Message Access Protocol
c. User Datagram Protocol
d. Simple Network Management Protocol
White Heavens Entertainment Ltd. has set up a new
website for informing people in detail about events that are being planned
across the city of Los Angeles. However, when a user tries to gain access to
its website to purchase tickets, there seems to be an IP error as a result of
which the site crashes. Analyze which of the layers of the OSI model must be
checked to fix this error.
a. Presentation layer
b. Transport layer
c. Data link layer
d. Network
layer
Which of
the following will act as the centralized point of interconnection in reference
to an organization's LAN, CAN, or WAN?
a. MDF
b. Demarc Point
c. VoIP telephone equipment
d. Data Room
You have been sent to the University of Yale to enable
voice calls using a broadband connection instead of a regular analog phone
line. Which of the following protocols would you apply in such a scenario?
a. POP3
b. VoIP
c. SIP
d. IMAP4
What is a graphical representation of network
devices and connections known as?
a. A network diagram
b. A wiring diagram
c. A rack diagram
d. A Zenmap
Which of the following diagrams is needed while
tracking and troubleshooting equipment installed in a rack?
a. A wiring diagram
b. A network mapper
c. A rack
diagram
d. A network diagram
Which of
the following is not a recognized cabling type for horizontal cabling as per
the ANSI/TIA standards?
a. Fiber optic cable
b. Patch cable
c. UTP
d. STP
As a
network engineer, you have been sent to ZoomCar Enterprises to have a routine
check on the network devices. In doing so, you suddenly notice that there are
still some old-generation routers installed at certain points. You plan on
replacing these old routers with the new upgraded ones. At what life cycle
phase can you remove an old device from the network?
a. The requirement phase
b. The development phase
c. The
implementation phase
d.
The documentation and maintenance phase
You are
the DNS administrator and have been tasked to hold alternative names for a host
that is a newly established start-up venturing into the business of ecommerce.
The start-up wants its clients to be directed to the appropriate page whenever
they request for alternative names. Which of the following resource records
would you apply as a DNS administrator in such a case?
a. AAAA record
b. MX record
c. PTR record
d. CNAME record
Vialom
network has organized an online web concert featuring various well-known pop
stars, which will stream globally. It has contacted JMT internet services to
help the company in delivering a single video stream to multiple receivers so
that there is minimal network traffic. Analyze which of the following IPv6
addresses it should use in this case.
a. Multicast
address
b. Unicast address
c. Loopback address
d. Link local address
omputer A
started a communication sequence with Computer B that has a sequencing number
of 300070. Computer B accepted the request and sent an acknowledgment number of
300071. Until this point, no payload has been exchanged. So far, the sequence
numbers have increased by exactly 1 in each acknowledgment. Now, Computer A
sends a payload data that is 800 bits long. According to you, what will be the
acknowledgment number for the return message in this case?
a. 300800
b. 300870
c. 300072
d.
300871
You have been recently appointed by Jaylabs
Internet Solutions to verify the TCP/IP protocols that have been set up at
Heroku Industries for interorganizational purposes. On examining the TCP header
segment, you want to get a sense of the limit of the maximum bytes of data that
a computer can receive before returning an acknowledgment. Which of the
following fields in a TCP segment should you check in such a situation?
a. Header length
b. Window size
c. Options
d. Destination port
Meredith and Co. provides ISP services to a bulk of
the corporates in the Silicon Valley. However, due to the recent COVID
outbreak, a lot of the firms have started to allow their employees to work from
home. Ceratrix is one such company that wants to allow its employees to work
from home; however, certain features are only available to the employees when
they have access to their workstations in the organization. This basically
means that they would have to command the host computer. What remote access method
should be provided to Ceratrix to fulfill this requirement?
a. VPN
b. Remote file access
c. FTPS
d. Terminal emulation
Which of
the following protocols are used to transmit IP and other kinds of messages
through a tunnel?
a. OpenVPN
b. L2TP
c. IKEv2
d.
GRE
Which of
the following transceivers supports up to 10 Gbps?
a. SFP
b. QSFP
c. SFP+
d.
XFP
You are a network administrator for an ISP that
wants to increase the amount of data that can be transmitted within the given
bandwidth. For this purpose, you decide to use multiplexing technologies so
that you can modulate the signals into different frequencies that can travel
simultaneously over a single channel only to be demultiplexed at the other end.
Which of the following multiplexing types will you use in this case?
a. WDM
b. FDM
c. STDM
d. TDM
Which of the following 802.11 wireless standards
has a theoretical throughput of 11 Mbps?
a. 802.11n
b. 802.11a
c. 802.11ax
d. 802.11b
Local Brew is a small cafe operating in New York.
It has set up a free wireless network in its cafe to provide customers with
ease of Internet access. Recently, one of the customers lodged a complaint
against Local Brew regarding data theft from his emails, which has been traced
back to the cafe's public IP. Local Brew has informed Barton, who is the
network provider for the cafe, to rectify the issue. Which of the following
should Barton do to analyze and rectify the issue?
a. He should check if the antenna has been
misplaced.
b. He should check whether the geofencing
security option has been enabled.
c. He should check whether captive portal user reminders have been set
up.
d. He should check for guest network
preferences.
Michael
Slater is the new technician in the office. An issue has reduced the
performance of the network, but he is unable to diagnose the reason behind the
issue. On checking the recommended geographic range for the AP, he realizes
that the clients are not within the recommended distance. This has caused
multiple data errors and a deterioration in communication. Which of the
following issues has caused the issue here?
a. Insufficient wireless coverage
b. Simultaneous wired and wireless connections
c. Channel overlap
d. Interference
Which cloud characteristic allows a provider to
limit or charge by the amount of bandwidth, processing power, storage space, or
client connections available to customers?
a. Broad network access
b. Measured service
c. Rapid elasticity
d. Resource
pooling
Basil
Telecommunications have hired you as a network manager for providing a network
system that will include redundant processors, backup generators, and
earthquake-resilient installation. You have decided that the average downtime
per year cannot be more than 5 minutes 15 seconds. Which of the following will
you use in this scenario?
a. Two 9s
b. Five 9s
c. Four 9s
d. Three 9s
You have
been appointed to design a subnet mask for a network. The current IP address of
the network is 192.168.89.0. You have been requested by the network
administrator to divide this local network into nine subnets to correspond to
the organization's nine different floors. How many bits will you borrow from
the host portion of the ID address in this scenario?
a. Two bits
b. Four bits
c. Five bits
d. Three bits
The headquarters of BBK Solutions has detected a
possible attack with the help of VLAN tags. Mathews is the head of the Network
Administration department in BBK Solutions, and he has to come up with security
measures to prevent such instances from occurring in the future. Which of the
following security measures should Matthews consider keeping the VLAN pathway
as the primary focus?
a.
Auto-trunking on switches that do not need to support traffic from multiple
VLANs should be enabled.
b. All VLAN ranges should be accepted on each trunk.
c. The native VLAN should be changed to a used
VLAN ID.
d. The
default VLAN should not be used.
You as a network engineer want to create a subnet
that supports 16 hosts. Which of the following subnet masks will you use in
this scenario?
a. 255.255.255.240
b. 255.255.255.252
c. 255.255.255.248
d. 255.255.255.224
The organization where you are currently working as
a network administrator has a class A network address 10.0.0.0 with 40 subnets.
You want to add another 60 new subnets to the network. You would like to still
allow for the largest possible number of host IDs per subnet. Which of the
following subnet masks will you choose in this scenario?
a. 255.240.0.0
b. 255.248.0.0
c.
255.254.0.0
d. 255.252.0.0
Rodri has been contracted by an ISP to set up an
IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the
ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48
site prefix. Analyze which of the following scenarios will help Rodri in
calculating the total number of possible subnets.
a. MIL Ltd. can create up to 65,536 subnets.
b. MIL Ltd. can create up to 256 subnets.
c. Rodri should use the 2n = Y formula to
calculate the subnet.
d. MIL Ltd. can create only one single subnet.
You are
working as a network engineer with an ISP. A query has come to you from a
client who requires a guarantee of minimum uptime percentages if the service
goes down. Which of the following will you choose in this scenario?
a. Broadband
b. DSL
c. PTSN
d.
DIA
Which form of communication is well suited to users
who receive more information from the network than they send to it?
a. ADSL
b. VDSL
c. xDSL
d. SDSL
White Hawks runs a baseball stadium, and it would
like to set up a network that has a reasonable level of availability and
effectiveness so that fans can receive a close and strong signal throughput
when they watch a game. Analyze which of the following statements will help in
understanding why a 5G service is ideal in this scenario.
a. Higher frequency for bands would increase the throughput.
b. The cell
density for the network must be close.
c. Wider channels would help increase the speed.
d. Client volume will increase the throughput.
Which of the following is a type of DoS
(denial-of-service) attack that is bounced off uninfected computers before
being directed at the target?
a. Amplified DRDoS attack
b. DDoS attack
c. PDoS attack
d. DRDoS attack
Hammond Industries has appointed Gavin as the
network administrator to set up a complete secured and flawless network
throughout the office premises. One of the employees has come to him to fix an
error message that keeps popping up every time he tries to open the web
browser. He also states that this error started popping up after the external
hard drive had been used to transfer some of the necessary documents to the
HR's office. Analyze what kind of malware might possibly be behind this error.
a. Worm
b. Virus
c. Ransomware
d. Trojan horse
An organization hires you to handle the security
policies of the organization. In order to protect the organization's network
from data breaches and potential hacks, you decide to draft a policy that will
require the employees of the organization to adhere to a certain set of rules
while accessing the network's resources. To ensure that these rules are
followed without fail, you decide to impose certain penalties for situations
where violations may occur. Which of the following will help you achieve these
standards?
a. Password
policy
b. AUP
c. NDA
d. PUA
Which of the following technologies selectively
filters or blocks traffic between networks?
a. IPS
b. IDS
c. Firewall
d. Proxy server
Which authorization method grants access to a user
when the user's classification and category match those of a resource?
a. SoD
b. RBAC
c. DAC
d. MAC
You have been working as a network engineer with an
organization. You have decided to implement information access control to limit
the users and devices that can get to your data and other network resources.
For this purpose, you plan on using a username and password as a measure of
security to grant any user access to your organization's resources. Which of
the elements of the AAAA acronym will you use to apply this security measure?
a. Accounting
b. Authorization
c. Authentication
d. Auditing
Yugen is a network administrator who is in the
process of configuring CoPP (control plane policing) on a router. In this
scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no
limits from one trusted device. All other ICMP traffic is limited and, when
exceeding that limit, is dropped. Analyze which of the following commands Yugen
should use to create a class map named limit-icmp that will classify traffic
according to defined criteria such as an ACL.
a. class limit-icmp
b. match access-group
c. policy-map
d. class-map limit-icmp
Which network monitoring method can be used to
ensure that all traffic sent to any port on a switch is also sent to a device
connected to the mirrored port?
a. Wireless monitoring
b. Reporting
c. In-line monitoring
d. Port mirroring
Trevor is
working as a network engineer at Spring Oaks High School. The school's
management has been facing some issues while handling network traffic. Trevor
wants to check the bandwidth as he assumes that the issues faced by the
management are related to bandwidth errors. Which of the following technologies
should Trevor use to ensure some traffic gets priority over other traffic so
the most important traffic gets through even during times of congestion?
a. QoS
b. Flow control
c. Congestion control
d. Traffic shaping
Which of the following power flaws is also called a
sag?
a. Noise
b. Brownout
c. Blackout
d. Surge
Which of the following backs up only the data that
has changed since the last backup?
a. Cloud backup
b. Full backup
c.
Differential backup
d. Incremental backup
Agar is a network analyst at BMV, a mobile network.
He efficiently manages the network's QoS (Quality of Service) configurations
for adjusting the priority a network assigns to various types of transmissions.
He ensures timely delivery of the most important traffic while optimizing
performance for all users. The management at BMV wants to conduct a pilot test
for a new product, and they have requested Agar to limit the momentary
throughput rate for an interface. Analyze which of the following Agar should use
in this scenario.
a. CoS
b. Traffic policing
c. DiffServ
d. Flow control
Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into?
a. Layer 4
b. Layer 6
c. Layer 2
d. Layer 3
All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use?
a. mesh
b. bus
c. star
d. ring
Which of the following protocols might someone use to send an email?
a. SMTP
b. FTP
c. HTTP
d. RDP
Kumail wants to check his bank account balance to see if a transaction has cleared from a purchase he made the previous day. Which of the following protocols would most likely be used to do this?
a. FTP
b. HTTP
c. RDP
d. HTTPS
The network administrator for an organization needs to install a network at his company's new branch office. The branch office will have 30 computers that will all connect to the Internet, where they will share a single public IP address. Which of the following devices must the network administrator install to ensure the devices are able to send traffic out to the Internet and receive the corresponding traffic back?
a. hub
b. router
c. token ring
d. switch
Dahlia has just installed gigabit routers and switches at the company's headquarters. Which of the following might she need to do in order to allow the computers that came with 10/100 network ports to transfer data at the faster speeds?
a. Issue new tokens to each user
b. Install a NIC on each of the computers
c. Install a hub at each user's workstation
d. Configure the routers to push out updates to the computers advertising the new speeds
Sandra is attempting to resolve an issue on her company's network: several users are unable to access one of the company's intranet web servers. She has developed a theory and tested it to determine the cause. Which of the following steps should she complete next?
a. Document findings, actions, and outcomes
b. Implement the solution or escalate the problem
c. Identify the problem and its symptoms
d. Establish a plan for resolving the problem
Which of the following statements stands true?
a. FTP servers provide secure encryption for file transfer.
b. An email can be downloaded to the client computer using POP3.
c. HTTP is a secured protocol that provides secure transmission.
d. The DBMS does not support a multiuser environment
Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?
a. File server
b. Router
c. Network printer
d. Smartphone
Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?
a. Transmission Control Protocol
b. Internet Message Access Protocol
c. User Datagram Protocol
d. Simple Network Management Protocol
White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.
a. Presentation layer
b. Transport layer
c. Data link layer
d. Network layer
Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?
a. MDF
b. Demarc Point
c. VoIP telephone equipment
d. Data Room
You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario?
a. POP3
b. VoIP
c. SIP
d. IMAP4
What is a graphical representation of network devices and connections known as?
a. A network diagram
b. A wiring diagram
c. A rack diagram
d. A Zenmap
Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack?
a. A wiring diagram
b. A network mapper
c. A rack diagram
d. A network diagram
Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?
a. Fiber optic cable
b. Patch cable
c. UTP
d. STP
As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?
a. The requirement phase
b. The development phase
c. The implementation phase
d. The documentation and maintenance phase
You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?
a. AAAA record
b. MX record
c. PTR record
d. CNAME record
Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.
a. Multicast address
b. Unicast address
c. Loopback address
d. Link local address
omputer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?
a. 300800
b. 300870
c. 300072
d. 300871
You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?
a. Header length
b. Window size
c. Options
d. Destination port
Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?
a. VPN
b. Remote file access
c. FTPS
d. Terminal emulation
Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?
a. OpenVPN
b. L2TP
c. IKEv2
d. GRE
Which of the following transceivers supports up to 10 Gbps?
a. SFP
b. QSFP
c. SFP+
d. XFP
You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case?
a. WDM
b. FDM
c. STDM
d. TDM
Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?
a. 802.11n
b. 802.11a
c. 802.11ax
d. 802.11b
Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?
a. He should check if the antenna has been misplaced.
b. He should check whether the geofencing security option has been enabled.
c. He should check whether captive portal user reminders have been set up.
d. He should check for guest network preferences.
Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?
a. Insufficient wireless coverage
b. Simultaneous wired and wireless connections
c. Channel overlap
d. Interference
Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?
a. Broad network access
b. Measured service
c. Rapid elasticity
d. Resource pooling
Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario?
a. Two 9s
b. Five 9s
c. Four 9s
d. Three 9s
You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?
a. Two bits
b. Four bits
c. Five bits
d. Three bits
The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?
a. Auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled.
b. All VLAN ranges should be accepted on each trunk.
c. The native VLAN should be changed to a used VLAN ID.
d. The default VLAN should not be used.
You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?
a. 255.255.255.240
b. 255.255.255.252
c. 255.255.255.248
d. 255.255.255.224
The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?
a. 255.240.0.0
b. 255.248.0.0
c. 255.254.0.0
d. 255.252.0.0
Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.
a. MIL Ltd. can create up to 65,536 subnets.
b. MIL Ltd. can create up to 256 subnets.
c. Rodri should use the 2n = Y formula to calculate the subnet.
d. MIL Ltd. can create only one single subnet.
You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario?
a. Broadband
b. DSL
c. PTSN
d. DIA
Which form of communication is well suited to users who receive more information from the network than they send to it?
a. ADSL
b. VDSL
c. xDSL
d. SDSL
White Hawks runs a baseball stadium, and it would like to set up a network that has a reasonable level of availability and effectiveness so that fans can receive a close and strong signal throughput when they watch a game. Analyze which of the following statements will help in understanding why a 5G service is ideal in this scenario.
a. Higher frequency for bands would increase the throughput.
b. The cell density for the network must be close.
c. Wider channels would help increase the speed.
d. Client volume will increase the throughput.
Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?
a. Amplified DRDoS attack
b. DDoS attack
c. PDoS attack
d. DRDoS attack
Hammond Industries has appointed Gavin as the network administrator to set up a complete secured and flawless network throughout the office premises. One of the employees has come to him to fix an error message that keeps popping up every time he tries to open the web browser. He also states that this error started popping up after the external hard drive had been used to transfer some of the necessary documents to the HR's office. Analyze what kind of malware might possibly be behind this error.
a. Worm
b. Virus
c. Ransomware
d. Trojan horse
An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?
a. Password policy
b. AUP
c. NDA
d. PUA
Which of the following technologies selectively filters or blocks traffic between networks?
a. IPS
b. IDS
c. Firewall
d. Proxy server
Which authorization method grants access to a user when the user's classification and category match those of a resource?
a. SoD
b. RBAC
c. DAC
d. MAC
You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization's resources. Which of the elements of the AAAA acronym will you use to apply this security measure?
a. Accounting
b. Authorization
c. Authentication
d. Auditing
Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL.
a. class limit-icmp
b. match access-group
c. policy-map
d. class-map limit-icmp
Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?
a. Wireless monitoring
b. Reporting
c. In-line monitoring
d. Port mirroring
Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?
a. QoS
b. Flow control
c. Congestion control
d. Traffic shaping
Which of the following power flaws is also called a sag?
a. Noise
b. Brownout
c. Blackout
d. Surge
Which of the following backs up only the data that has changed since the last backup?
a. Cloud backup
b. Full backup
c. Differential backup
d. Incremental backup
Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario.
a. CoS
b. Traffic policing
c. DiffServ
d. Flow control
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server?
Hide Feedback
Correct
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Hide Feedback
Correct
What command requests the next record in an SNMP log?
Hide Feedback
Correct
What port do SNMP agents listen on?
Hide Feedback
Correct
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Hide Feedback
Correct
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
Hide Feedback
Correct
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Hide Feedback
Correct
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Hide Feedback
Correct
Which log type is used to prove who did what and when?
Hide Feedback
Correct
Which of the following client-server applications use Apache and Nginx?
a. Web service
b. Email services
c. DNS service
d. FTP services
Which wireless technology is used to track fitness activity levels and geographic movement?
a. NFC
b. ANT+
c. Infrared
d. Bluetooth
The part which identifies the network in an IPv4 address is known as _____. a. the network ID b. the site prefix c. the VTP
d. the host ID
Subnetting, which alters the rules of classful IPv4 addressing, is known as _____. a. classless addressing b. relay agent c. VLSM
d. IP helper address
Which of the following server racks would you use for a bolt-free mounting?
a. Threaded racks
b. Square-hole racks
c. Round-hole racks
d. Nonthreaded racks
Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?
a. 300800
b. 300870
c. 300871
d. 300072
Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?
a. LDAP
b. SMB
c. SQLnet
d. TFTP
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?
Hide Feedback
Correct
3
Question
When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster? [Choose all that apply]
Correct
3 of 8
4
Question
A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created?
Correct
4 of 8
5
Question
After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose?
Correct
5 of 8
6
Question
Which of the following needs to be done to ensure a backup can be scheduled? [Choose all that apply]
Correct
6 of 8
7
Question
A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster.
Correct
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?
WEEK- 2 code install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf) str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>% summarise(total_count=n(), .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1. In the Insurance data set, how many Lawyers are there? A). 1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A). 204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7 1. What...
Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A) True 2. Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A) Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A) Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...
GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00 out of 10.00 ( 80 %) Top of Form Question 1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question 2 Incorrect 0.00 point...
Comments
Post a Comment