Skip to main content

IS5203 Week1 ( 2nd Batch )

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
Correct
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Correct
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Correct
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
Correct
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Correct
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Correct
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
Correct
What type of diagram shows a graphical representation of a network's wired infrastructure?
Correct
Which of these is considered a secure place to store a list of documented network passwords?
Correct
What is the first step of inventory management?
Correct
Item completed: 01/13/2022 01:33 AM
Value: 1
Answer: Network
PASS
4. Question
Actioned
Item completed: 01/13/2022 01:38 AM
Value: 1
Answer: Handles the processing and converting of data
PASS
5. Question
Actioned
Item completed: 01/13/2022 01:39 AM
Value: 1
Answer: Network
PASS
6. Question
Actioned
Item completed: 01/13/2022 01:43 AM
Value: 1
Answer:
Adds headers to the data that is sent across the network
Ensures security and reliability of data transmission
PASS
7. Question
Actioned
Item completed: 01/13/2022 01:43 AM
Value: 1
Answer: Layer 3
PASS
Score : 5 out of 5 (100%)
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
Correct
Which two encryption protocols might be used to provide secure transmissions for email services?
Correct
Which of the following applications could be used to run a website from a server?
Correct
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Incorrect
In the event of a fire, the most appropriate failure policy is a _______ policy.
Correct
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Correct
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
Correct
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Correct
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
Correct
Which of the following is an application layer protocol?
Correct
Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?
Correct
Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario.
Correct
JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario?
Correct
Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?
Correct
The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?
Correct
Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?
Correct
Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?
Correct
You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?
Correct
You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?
Correct
The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario?
Correct
The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.
Correct
Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?
Correct
You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand?
Correct
Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands?
Correct
Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario?
Correct
In the formula 2h – 2 = Z, what does h represent?
Correct
Mojaro Bank at Datona has contacted Vincent, a network provider, to provide Mojaro with a network connection that will enable it to securely conduct financial transactions with the other branches situated across various states in the United States as well as with the International Monetary Fund. Analyze which of the following connections would be best suited in this scenario.
Correct
A client has complained of losing Internet connectivity. You as a network engineer troubleshoot the error, and you find that the source of the error is the computer's wired connection. You decide to solve the issue by replacing the wired connection with a wireless one. What kind of an issue are you resolving in this scenario?
Correct
In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system?
Correct
Jasmine has been working as the chief accountant for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network administrator, has recently discovered that Jasmine is actually the same person who creates as well as authorizes the vendor account payments. Analyze if any of the following agreements has been violated in this scenario.
Correct
Neon Printers has set up a full network of laptops for the purpose of running multiple printing projects simultaneously. It has contracted Theo Solutions to provide network security solutions while protecting its network from certain traffic. Analyze which of the following is best applicable in this scenario.
Correct
You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario?
Correct
Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue.
Correct
Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management?
Correct
1. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer: Router
PASS
2. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer: Hub
PASS
3. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer:
Flexible deployment of a wireless access point
Simplified wireless network maintenance
Interference detection
Wireless access point status detection
PASS
4. Question
Actioned
Item completed: 01/13/2022 02:14 AM
Value: 1
Answer: Remote Terminal Unit (RTU)
PASS
5. Question
Actioned
Item completed: 01/13/2022 02:15 AM
Value: 1
Answer: Liquid
PASS
Score : 5 out of 5 (100%)























































































































































































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh