A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
Hide Feedback
Correct
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Hide Feedback
Correct
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Hide Feedback
Correct
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
Hide Feedback
Correct
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Hide Feedback
Correct
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Hide Feedback
Correct
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
Hide Feedback
Correct
What type of diagram shows a graphical representation of a network's wired infrastructure?
Hide Feedback
Correct
Which of these is considered a secure place to store a list of documented network passwords?
Hide Feedback
Correct
What is the first step of inventory management?
Hide Feedback
Correct
Item completed: 01/13/2022 01:33 AM
Value: 1
Answer: Network
PASS
4. Question
Actioned
Item completed: 01/13/2022 01:38 AM
Value: 1
Answer: Handles the processing and converting of data
PASS
5. Question
Actioned
Item completed: 01/13/2022 01:39 AM
Value: 1
Answer: Network
PASS
6. Question
Actioned
Item completed: 01/13/2022 01:43 AM
Value: 1
Answer:
Adds headers to the data that is sent across the network
Ensures security and reliability of data transmission
Adds headers to the data that is sent across the network
Ensures security and reliability of data transmission
PASS
7. Question
Actioned
Item completed: 01/13/2022 01:43 AM
Value: 1
Answer: Layer 3
PASS
Score : 5 out of 5 (100%)
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
Hide Feedback
Correct
Which two encryption protocols might be used to provide secure transmissions for email services?
Hide Feedback
Correct
Which of the following applications could be used to run a website from a server?
Hide Feedback
Correct
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Hide Feedback
Incorrect
In the event of a fire, the most appropriate failure policy is a _______ policy.
Hide Feedback
Correct
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Hide Feedback
Correct
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
Hide Feedback
Correct
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Hide Feedback
Correct
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
Hide Feedback
Correct
Which of the following is an application layer protocol?
Hide Feedback
Correct
Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?
Hide Feedback
Correct
Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario.
Hide Feedback
Correct
JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario?
Hide Feedback
Correct
Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?
Hide Feedback
Correct
The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?
Hide Feedback
Correct
Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?
Hide Feedback
Correct
Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?
Hide Feedback
Correct
You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?
Hide Feedback
Correct
You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?
Hide Feedback
Correct
The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario?
Hide Feedback
Correct
The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.
Hide Feedback
Correct
Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?
Hide Feedback
Correct
You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand?
Hide Feedback
Correct
Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands?
Hide Feedback
Correct
Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario?
Hide Feedback
Correct
In the formula 2h – 2 = Z, what does h represent?
Hide Feedback
Correct
Mojaro Bank at Datona has contacted Vincent, a network provider, to provide Mojaro with a network connection that will enable it to securely conduct financial transactions with the other branches situated across various states in the United States as well as with the International Monetary Fund. Analyze which of the following connections would be best suited in this scenario.
Hide Feedback
Correct
A client has complained of losing Internet connectivity. You as a network engineer troubleshoot the error, and you find that the source of the error is the computer's wired connection. You decide to solve the issue by replacing the wired connection with a wireless one. What kind of an issue are you resolving in this scenario?
Hide Feedback
Correct
In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system?
Hide Feedback
Correct
Jasmine has been working as the chief accountant for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network administrator, has recently discovered that Jasmine is actually the same person who creates as well as authorizes the vendor account payments. Analyze if any of the following agreements has been violated in this scenario.
Hide Feedback
Correct
Neon Printers has set up a full network of laptops for the purpose of running multiple printing projects simultaneously. It has contracted Theo Solutions to provide network security solutions while protecting its network from certain traffic. Analyze which of the following is best applicable in this scenario.
Hide Feedback
Correct
You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario?
Hide Feedback
Correct
Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue.
Hide Feedback
Correct
Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management?
Hide Feedback
Correct
1. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer: Router
PASS
2. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer: Hub
PASS
3. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer:
Flexible deployment of a wireless access point
Simplified wireless network maintenance
Interference detection
Wireless access point status detection
Flexible deployment of a wireless access point
Simplified wireless network maintenance
Interference detection
Wireless access point status detection
PASS
4. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer: Remote Terminal Unit (RTU)
PASS
5. Question
Actioned
Item completed: 01/13/2022 02:15 AM
Value: 1
Answer: Liquid
PASS
Score : 5 out of 5 (100%)
Comments
Post a Comment