Carlos
has just created a new subnet for the finance department. He needs to be able
to allow the employees in finance to retrieve files from the sales server,
which is located in another subnet. Which of the following OSI model layers
would it be necessary to categorize the device into?
a. Layer 4
b. Layer 6
c. Layer 2
d.
Layer 3
All of the cubicles in a company's office have
cables that run up to the ceiling and across to an IDF. Inside the IDF, they
connect directly to the latest generation switch available from the networking
equipment vendor that they have chosen. Which of the following describes the
physical topology most likely in use?
a. mesh
b. bus
c. star
d. ring
Which of
the following protocols might someone use to send an email?
a. SMTP
b. FTP
c. HTTP
d. RDP
Kumail
wants to check his bank account balance to see if a transaction has cleared
from a purchase he made the previous day. Which of the following protocols
would most likely be used to do this?
a. FTP
b. HTTP
c. RDP
d.
HTTPS
The network administrator for an organization needs
to install a network at his company's new branch office. The branch office will
have 30 computers that will all connect to the Internet, where they will share
a single public IP address. Which of the following devices must the network
administrator install to ensure the devices are able to send traffic out to the
Internet and receive the corresponding traffic back?
a. hub
b. router
c. token ring
d. switch
Dahlia has just installed gigabit routers and
switches at the company's headquarters. Which of the following might she need
to do in order to allow the computers that came with 10/100 network ports to
transfer data at the faster speeds?
a. Issue new tokens to each user
b. Install a NIC on each of the computers
c. Install a hub at each user's workstation
d. Configure the routers to push out updates to
the computers advertising the new speeds
Sandra is
attempting to resolve an issue on her company's network: several users are
unable to access one of the company's intranet web servers. She has developed a
theory and tested it to determine the cause. Which of the following steps
should she complete next?
a. Document
findings, actions, and outcomes
b. Implement
the solution or escalate the problem
c. Identify the problem and its symptoms
d. Establish a plan for resolving the problem
Which of the following statements stands true?
a. FTP servers provide secure encryption for file transfer.
b. An email can be downloaded to the client computer using POP3.
c. HTTP is a secured protocol that provides
secure transmission.
d. The DBMS does not support a multiuser
environment
Which of
the following network devices does not fall under the category of "end
devices" as certified by CISCO?
a. File server
b. Router
c. Network printer
d. Smartphone
Kyle is a property consultant, and he has hired you
as a programmer to make an application that sends data regarding property sites
to his client's base. He has also asked you to ensure that the application
should check whether the data has been received and if not, it should resend
the data. Which of the following protocols would you apply in such a scenario?
a.
Transmission Control Protocol
b. Internet Message Access Protocol
c. User Datagram Protocol
d. Simple Network Management Protocol
White Heavens Entertainment Ltd. has set up a new
website for informing people in detail about events that are being planned
across the city of Los Angeles. However, when a user tries to gain access to
its website to purchase tickets, there seems to be an IP error as a result of
which the site crashes. Analyze which of the layers of the OSI model must be
checked to fix this error.
a. Presentation layer
b. Transport layer
c. Data link layer
d. Network
layer
Which of
the following will act as the centralized point of interconnection in reference
to an organization's LAN, CAN, or WAN?
a. MDF
b. Demarc Point
c. VoIP telephone equipment
d. Data Room
You have been sent to the University of Yale to
enable voice calls using a broadband connection instead of a regular analog
phone line. Which of the following protocols would you apply in such a
scenario?
a. POP3
b. VoIP
c. SIP
d. IMAP4
What is a graphical representation of network
devices and connections known as?
a. A network diagram
b. A wiring diagram
c. A rack diagram
d. A Zenmap
Which of the following diagrams is needed while
tracking and troubleshooting equipment installed in a rack?
a. A wiring diagram
b. A network mapper
c. A rack
diagram
d. A network diagram
Which of
the following is not a recognized cabling type for horizontal cabling as per
the ANSI/TIA standards?
a. Fiber optic cable
b. Patch cable
c. UTP
d. STP
As a
network engineer, you have been sent to ZoomCar Enterprises to have a routine
check on the network devices. In doing so, you suddenly notice that there are
still some old-generation routers installed at certain points. You plan on
replacing these old routers with the new upgraded ones. At what life cycle
phase can you remove an old device from the network?
a. The requirement phase
b. The development phase
c. The
implementation phase
d.
The documentation and maintenance phase
You are
the DNS administrator and have been tasked to hold alternative names for a host
that is a newly established start-up venturing into the business of ecommerce.
The start-up wants its clients to be directed to the appropriate page whenever
they request for alternative names. Which of the following resource records
would you apply as a DNS administrator in such a case?
a. AAAA record
b. MX record
c. PTR record
d. CNAME record
Vialom
network has organized an online web concert featuring various well-known pop
stars, which will stream globally. It has contacted JMT internet services to
help the company in delivering a single video stream to multiple receivers so
that there is minimal network traffic. Analyze which of the following IPv6
addresses it should use in this case.
a. Multicast
address
b. Unicast address
c. Loopback address
d. Link local address
omputer A
started a communication sequence with Computer B that has a sequencing number
of 300070. Computer B accepted the request and sent an acknowledgment number of
300071. Until this point, no payload has been exchanged. So far, the sequence
numbers have increased by exactly 1 in each acknowledgment. Now, Computer A
sends a payload data that is 800 bits long. According to you, what will be the
acknowledgment number for the return message in this case?
a. 300800
b. 300870
c. 300072
d.
300871
You have been recently appointed by Jaylabs
Internet Solutions to verify the TCP/IP protocols that have been set up at
Heroku Industries for interorganizational purposes. On examining the TCP header
segment, you want to get a sense of the limit of the maximum bytes of data that
a computer can receive before returning an acknowledgment. Which of the
following fields in a TCP segment should you check in such a situation?
a. Header length
b. Window size
c. Options
d. Destination port
Meredith and Co. provides ISP services to a bulk of
the corporates in the Silicon Valley. However, due to the recent COVID
outbreak, a lot of the firms have started to allow their employees to work from
home. Ceratrix is one such company that wants to allow its employees to work
from home; however, certain features are only available to the employees when
they have access to their workstations in the organization. This basically
means that they would have to command the host computer. What remote access method
should be provided to Ceratrix to fulfill this requirement?
a. VPN
b. Remote file access
c. FTPS
d. Terminal emulation
Which of
the following protocols are used to transmit IP and other kinds of messages
through a tunnel?
a. OpenVPN
b. L2TP
c. IKEv2
d.
GRE
Which of
the following transceivers supports up to 10 Gbps?
a. SFP
b. QSFP
c. SFP+
d.
XFP
You are a network administrator for an ISP that
wants to increase the amount of data that can be transmitted within the given
bandwidth. For this purpose, you decide to use multiplexing technologies so
that you can modulate the signals into different frequencies that can travel
simultaneously over a single channel only to be demultiplexed at the other end.
Which of the following multiplexing types will you use in this case?
a. WDM
b. FDM
c. STDM
d. TDM
Which of the following 802.11 wireless standards
has a theoretical throughput of 11 Mbps?
a. 802.11n
b. 802.11a
c. 802.11ax
d. 802.11b
Local Brew is a small cafe operating in New York.
It has set up a free wireless network in its cafe to provide customers with
ease of Internet access. Recently, one of the customers lodged a complaint
against Local Brew regarding data theft from his emails, which has been traced
back to the cafe's public IP. Local Brew has informed Barton, who is the
network provider for the cafe, to rectify the issue. Which of the following
should Barton do to analyze and rectify the issue?
a. He should check if the antenna has been
misplaced.
b. He should check whether the geofencing
security option has been enabled.
c. He should check whether captive portal user reminders have been set
up.
d. He should check for guest network
preferences.
Michael
Slater is the new technician in the office. An issue has reduced the
performance of the network, but he is unable to diagnose the reason behind the
issue. On checking the recommended geographic range for the AP, he realizes
that the clients are not within the recommended distance. This has caused
multiple data errors and a deterioration in communication. Which of the
following issues has caused the issue here?
a. Insufficient wireless coverage
b. Simultaneous wired and wireless connections
c. Channel overlap
d. Interference
Which cloud characteristic allows a provider to
limit or charge by the amount of bandwidth, processing power, storage space, or
client connections available to customers?
a. Broad network access
b. Measured service
c. Rapid elasticity
d. Resource
pooling
Basil
Telecommunications have hired you as a network manager for providing a network
system that will include redundant processors, backup generators, and
earthquake-resilient installation. You have decided that the average downtime
per year cannot be more than 5 minutes 15 seconds. Which of the following will
you use in this scenario?
a. Two 9s
b. Five 9s
c. Four 9s
d. Three 9s
You have
been appointed to design a subnet mask for a network. The current IP address of
the network is 192.168.89.0. You have been requested by the network
administrator to divide this local network into nine subnets to correspond to
the organization's nine different floors. How many bits will you borrow from
the host portion of the ID address in this scenario?
a. Two bits
b. Four bits
c. Five bits
d. Three bits
The headquarters of BBK Solutions has detected a
possible attack with the help of VLAN tags. Mathews is the head of the Network
Administration department in BBK Solutions, and he has to come up with security
measures to prevent such instances from occurring in the future. Which of the
following security measures should Matthews consider keeping the VLAN pathway
as the primary focus?
a.
Auto-trunking on switches that do not need to support traffic from multiple
VLANs should be enabled.
b. All VLAN ranges should be accepted on each trunk.
c. The native VLAN should be changed to a used
VLAN ID.
d. The
default VLAN should not be used.
You as a network engineer want to create a subnet
that supports 16 hosts. Which of the following subnet masks will you use in
this scenario?
a. 255.255.255.240
b. 255.255.255.252
c. 255.255.255.248
d. 255.255.255.224
The organization where you are currently working as
a network administrator has a class A network address 10.0.0.0 with 40 subnets.
You want to add another 60 new subnets to the network. You would like to still
allow for the largest possible number of host IDs per subnet. Which of the
following subnet masks will you choose in this scenario?
a. 255.240.0.0
b. 255.248.0.0
c.
255.254.0.0
d. 255.252.0.0
Rodri has been contracted by an ISP to set up an
IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the
ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48
site prefix. Analyze which of the following scenarios will help Rodri in
calculating the total number of possible subnets.
a. MIL Ltd. can create up to 65,536 subnets.
b. MIL Ltd. can create up to 256 subnets.
c. Rodri should use the 2n = Y formula to
calculate the subnet.
d. MIL Ltd. can create only one single subnet.
You are
working as a network engineer with an ISP. A query has come to you from a
client who requires a guarantee of minimum uptime percentages if the service
goes down. Which of the following will you choose in this scenario?
a. Broadband
b. DSL
c. PTSN
d.
DIA
Which form of communication is well suited to users
who receive more information from the network than they send to it?
a. ADSL
b. VDSL
c. xDSL
d. SDSL
White Hawks runs a baseball stadium, and it would
like to set up a network that has a reasonable level of availability and
effectiveness so that fans can receive a close and strong signal throughput
when they watch a game. Analyze which of the following statements will help in
understanding why a 5G service is ideal in this scenario.
a. Higher frequency for bands would increase the throughput.
b. The cell
density for the network must be close.
c. Wider channels would help increase the speed.
d. Client volume will increase the throughput.
Which of the following is a type of DoS
(denial-of-service) attack that is bounced off uninfected computers before
being directed at the target?
a. Amplified DRDoS attack
b. DDoS attack
c. PDoS attack
d. DRDoS attack
Hammond Industries has appointed Gavin as the
network administrator to set up a complete secured and flawless network
throughout the office premises. One of the employees has come to him to fix an
error message that keeps popping up every time he tries to open the web
browser. He also states that this error started popping up after the external
hard drive had been used to transfer some of the necessary documents to the
HR's office. Analyze what kind of malware might possibly be behind this error.
a. Worm
b. Virus
c. Ransomware
d. Trojan horse
An organization hires you to handle the security
policies of the organization. In order to protect the organization's network
from data breaches and potential hacks, you decide to draft a policy that will
require the employees of the organization to adhere to a certain set of rules
while accessing the network's resources. To ensure that these rules are
followed without fail, you decide to impose certain penalties for situations
where violations may occur. Which of the following will help you achieve these
standards?
a. Password
policy
b. AUP
c. NDA
d. PUA
Which of the following technologies selectively
filters or blocks traffic between networks?
a. IPS
b. IDS
c. Firewall
d. Proxy server
Which authorization method grants access to a user
when the user's classification and category match those of a resource?
a. SoD
b. RBAC
c. DAC
d. MAC
You have been working as a network engineer with an
organization. You have decided to implement information access control to limit
the users and devices that can get to your data and other network resources.
For this purpose, you plan on using a username and password as a measure of
security to grant any user access to your organization's resources. Which of
the elements of the AAAA acronym will you use to apply this security measure?
a. Accounting
b. Authorization
c. Authentication
d. Auditing
Yugen is a network administrator who is in the
process of configuring CoPP (control plane policing) on a router. In this
scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no
limits from one trusted device. All other ICMP traffic is limited and, when
exceeding that limit, is dropped. Analyze which of the following commands Yugen
should use to create a class map named limit-icmp that will classify traffic
according to defined criteria such as an ACL.
a. class limit-icmp
b. match access-group
c. policy-map
d. class-map limit-icmp
Which network monitoring method can be used to
ensure that all traffic sent to any port on a switch is also sent to a device
connected to the mirrored port?
a. Wireless monitoring
b. Reporting
c. In-line monitoring
d. Port mirroring
Trevor is
working as a network engineer at Spring Oaks High School. The school's
management has been facing some issues while handling network traffic. Trevor
wants to check the bandwidth as he assumes that the issues faced by the
management are related to bandwidth errors. Which of the following technologies
should Trevor use to ensure some traffic gets priority over other traffic so
the most important traffic gets through even during times of congestion?
a. QoS
b. Flow control
c. Congestion control
d. Traffic shaping
Which of the following power flaws is also called a
sag?
a. Noise
b. Brownout
c. Blackout
d. Surge
Which of the following backs up only the data that
has changed since the last backup?
a. Cloud backup
b. Full backup
c.
Differential backup
d. Incremental backup
Agar is a network analyst at BMV, a mobile network.
He efficiently manages the network's QoS (Quality of Service) configurations
for adjusting the priority a network assigns to various types of transmissions.
He ensures timely delivery of the most important traffic while optimizing
performance for all users. The management at BMV wants to conduct a pilot test
for a new product, and they have requested Agar to limit the momentary
throughput rate for an interface. Analyze which of the following Agar should use
in this scenario.
a. CoS
b. Traffic policing
c. DiffServ
d. Flow control
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server?
Hide Feedback
Correct
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Hide Feedback
Correct
What command requests the next record in an SNMP log?
Hide Feedback
Correct
What port do SNMP agents listen on?
Hide Feedback
Correct
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Hide Feedback
Correct
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
Hide Feedback
Correct
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Hide Feedback
Correct
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Hide Feedback
Correct
Which log type is used to prove who did what and when?
Hide Feedback
Correct
Which of the following
client-server applications use Apache and Nginx?
a. Web service
b. Email services
c. DNS service
d. FTP services
Which wireless technology is used to track fitness
activity levels and geographic movement?
a. NFC
b. ANT+
c. Infrared
d. Bluetooth
The part which identifies the network in an IPv4 address
is known as _____. a. the network ID
b. the site prefix
c. the VTP
d. the host ID
Subnetting, which alters the rules of classful IPv4
addressing, is known as _____. a. classless addressing
b. relay agent
c. VLSM
d. IP helper address
Which of the following server racks would you use
for a bolt-free mounting?
a. Threaded racks
b. Square-hole racks
c. Round-hole racks
d. Nonthreaded racks
Computer A started a communication sequence with
Computer B that has a sequencing number of 300070. Computer B accepted the
request and sent an acknowledgment number of 300071. Until this point, no
payload has been exchanged. So far, the sequence numbers have increased by
exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is
800 bits long. According to you, what will be the acknowledgment number for the
return message in this case?
a. 300800
b. 300870
c. 300871
d. 300072
Which of the following protocols will an Oracle
Database use to communicate with other Oracle Databases?
a. LDAP
b. SMB
c. SQLnet
d. TFTP
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?
Hide Feedback
Correct
3
Question
When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster? [Choose all that apply]
Correct
3 of 8
4
Question
A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created?
Correct
4 of 8
5
Question
After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose?
Correct
5 of 8
6
Question
Which of the following needs to be done to ensure a backup can be scheduled? [Choose all that apply]
Correct
6 of 8
7
Question
A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster.
WEEK- 2 code install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf) str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>% summarise(total_count=n(), .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1. In the Insurance data set, how many Lawyers are there? A). 1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A). 204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7 1. What...
Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A) True 2. Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A) Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A) Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...
GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00 out of 10.00 ( 80 %) Top of Form Question 1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question 2 Incorrect 0.00 point...
Comments
Post a Comment