Skip to main content

IS5203 Week 1 Quizezz

Which layer of the OSI model should you examine if you want to troubleshoot a problem with the HTTP protocol?
CORRECT
Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?
CORRECT
You need to be able to create rules to filter packets and protect against attacks from the Internet. What type of device should you use?
CORRECT
Which of the following is an authentication protocol that encrypts the username, authorization, and accounting information, works only over TCP, and was developed by Cisco?
CORRECT
You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that run the conferencing client application receive packets related to the videoconference. You need to assign an address to the videoconferencing application. Which of the following addresses is appropriate?
CORRECT
You have just finished configuring a router on your corporate network that consists of several subnets. Some users have informed you that they have access to some of the servers, but not others that they used to have access to. What is the most likely reason for this problem?
CORRECT
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need?
CORRECT
Which of the following is a valid example of an IPv6 link local address?
CORRECT
You need to provide a method to ensure that sensitive files downloaded from your servers can be verified for integrity. Which of the following solutions can you deploy?
CORRECT
A user is unable to connect to a server with address 172.21.100.100. A technician troubleshooting the problem enters the ipconfig command and sees the output shown below. What should be done to resolve the problem?

Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
Link-local IPv6 Address . . . . . : fe80::ec42:7e6a:d2d4:5410%20
IPv4 Address. . . . . . . . . . . : 172.31.210.1
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 172.31.10.250
CORRECT
Which type of address uses 12 hexadecimal digits? (Choose two.)
CORRECT
Your company is using standard structuring cabling techniques. You need a spreadsheet created that tells you which switch port in the IDF each PC is plugged into. Which of the following will help you with this task? (Choose two.)
CORRECT
Which of the following works over two copper wire pairs, uses TDM, and transmits at 1.544 Mbps?
CORRECT
You need to ensure that customers have access to your public web servers in the event of a disaster such as a power outage or a failed server. What do you need to implement on your network?
CORRECT
Which type of Internet connection can provide an unshared connection over regular telephone lines operating with at least 1 Mbps of bandwidth?
CORRECT
Which of the following is the PDU used by a connection-oriented Transport layer protocol?
CORRECT
While interviewing a user that has reported trouble accessing a server, you determine that other users on the LAN have no problem accessing the server. What question should you ask next?
CORRECT
A user's computer is redirected to an attacker's server after the attacker transmitted several frames onto the network. After some investigation, you have found that the user's computer had an incorrect mapping of an IP address to a MAC address. What type of attack took place?
CORRECT
While setting up a new network, a technician connects two switches together using a Cat6 straight-through cable. The switch ports are configured for 1000BaseT Ethernet, full-duplex, and do not support auto-MDIX. After making the connection, the link status light for both ports remains off. What is the most likely problem?
CORRECT
Recent police reports suggest that unsavory individuals have been casing the neighborhood where your company is located. You want to ensure that an alarm is triggered in the event someone is detected roaming the premises after business hours. What are you most likely to deploy?
CORRECT
To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the technician configure?
CORRECT
Which authentication protocol uses PKI to provide mutual authentication?
CORRECT
You want to implement a system that uses certificates for identity verification and secure key management. What type of system do you need to implement?
CORRECT
A network has four switches, each with twenty computers connected to the switch ports. Each set of twenty computers been assigned a different IP network number. What is required for all computers to communicate with each other?
CORRECT
A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?
CORRECT
Which device should you install that will give your mobile users secure remote access to the company servers through the public Internet?
CORRECT
While using a protocol analyzer, you see a packet with UDP source port 68 and destination port 67. What are you seeing?
CORRECT
You are configuring an AP for a WLAN. You want to use the strongest encryption supported by the device. Which of the following should you choose?
CORRECT
You need to perform out-of-band management on a router. How should you connect to the router?
CORRECT
MMF cable runs from a company datacenter to a workgroup switch that has 16 RJ-45 ports. A connection must be made from the MMF cable to the switch. What is necessary?
CORRECT
3. Question
Actioned
Item completed: 01/15/2022 08:27 AM
Value: 1
Answer: Bottom up approach
PASS
4. Question
Actioned
Item completed: 01/15/2022 08:27 AM
Value: 1
Answer: Divide and conquer approach
PASS
5. Question
Actioned
Item completed: 01/15/2022 08:28 AM
Value: 1
Answer: Physical
PASS
6. Question
Actioned
Item completed: 01/15/2022 08:28 AM
Value: 1
Answer: Datalink layer
PASS
7. Question
Actioned
Item completed: 01/15/2022 08:28 AM
Value: 1
Answer: Transport Layer
PASS
3. Question
Actioned
Item completed: 01/15/2022 09:26 AM
Value: 1
Answer: Statement 1 describes a physical network diagram while statement 2 describes a logical one
PASS
4. Question
Actioned
Item completed: 01/15/2022 09:26 AM
Value: 1
Answer:
To determine the quantity of servers you need to purchase
To manage the size of the equipment to fit into the rack
PASS
5. Question
Actioned
Item completed: 01/15/2022 09:26 AM
Value: 1
Answer: Logical network topology
PASS
6. Question
Actioned
Item completed: 01/15/2022 09:26 AM
Value: 1
Answer: Rack diagram
PASS
7. Question
Actioned
Item completed: 01/15/2022 09:27 AM
Value: 1
Answer:
The port number of the switch used
The network device on the other end of the link
PASS
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
CORRECT
What type of diagram shows a graphical representation of a network's wired infrastructure?
CORRECT
What is the first step of inventory management?
CORRECT
Which of the following devices are you likely to find in the MDF? Choose all that apply.
CORRECT
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
CORRECT
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
CORRECT
You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.
CORRECT
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
CORRECT
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
CORRECT
Which of these is considered a secure place to store a list of documented network passwords?
CORRECT








































































































































































































 

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh