Virtual Machine Lab 12.3
3. Question
Actioned
Item
completed: 12/12/2022 10:11 AM
Value: 1
Answer:
The hard drives are all similarly configured
The server has the same roles installed as other servers in the cluster
The server has a network interface card configured the same as the other server
in the cluster
PASS
4. Question
Actioned
Item
completed: 12/12/2022 10:11 AM
Value: 1
Answer: PLCluster
PASS
5. Question
Actioned
Item
completed: 12/12/2022 10:11 AM
Value: 1
Answer: Recovery
Point Objective (RPO)
PASS
6. Question
Actioned
Item
completed: 12/12/2022 10:11 AM
Value: 1
Answer:
Install the Windows Server Backup feature
Identify and configure storage solution for the backup
PASS
7. Question
Actioned
Item
completed: 12/12/2022 10:11 AM
Value: 1
Answer: Warm
PASS
Score
: 5 out of 5 (100%)
Quiz: Module 12
1 1. While troubleshooting a recurring
problem on your network, you want to examine the TCP messages being exchanged
between a server and a client. Which tool should you use on the server?
Hide Feedback
Correct
2. One of your coworkers downloaded several, very
large video files for a special project she's working on for a new client. When
you run your network monitor later this afternoon, what list will your
coworker's computer likely show up on?
Hide Feedback
Correct
3.What command requests the next record in an SNMP
log?
Hide Feedback
Correct
4. What
port do SNMP agents listen on?
Hide Feedback
Correct
5. Your
roommate has been hogging the bandwidth on your router lately. What feature
should you configure on the router to limit the amount of bandwidth his
computer can utilize at any one time?
Hide Feedback
Correct
6. What
field in an IPv4 packet is altered to prioritize video streaming traffic over
web surfing traffic?
Hide Feedback
Correct
7. Which
power backup method will continually provide power to a server if the power
goes out during a thunderstorm?
Hide Feedback
Correct
8. Which
type of disaster recovery site contains all the equipment you would need to get
up and running again after a disaster, and yet would require several weeks to
implement?
Hide Feedback
Correct
9. Which
log type is used to prove who did what and when?
Hide Feedback
Correct
10. Which
data link layer flow control method offers the most efficient frame
transmission when sending large volumes of data?
Hide Feedback
Correct
Post-Assessment Quiz
1. 1. Carlos has just created a new subnet
for the finance department. He needs to be able to allow the employees in
finance to retrieve files from the sales server, which is located in another
subnet. Which of the following OSI model layers would it be necessary to
categorize the device into?
2. Hide Feedback
3. Correct
2. All
of the cubicles in a company's office have cables that run up to the ceiling
and across to an IDF. Inside the IDF, they connect directly to the latest
generation switch available from the networking equipment vendor that they have
chosen. Which of the following describes the physical topology most likely in
use?
Hide Feedback
Correct
3. Which
of the following protocols might someone use to send an email?
Hide Feedback
Correct
4. Kumail
wants to check his bank account balance to see if a transaction has cleared
from a purchase he made the previous day. Which of the following protocols
would most likely be used to do this?
Hide Feedback
Correct
5. The network administrator for an organization needs
to install a network at his company's new branch office. The branch office will
have 30 computers that will all connect to the Internet, where they will share
a single public IP address. Which of the following devices must the network
administrator install to ensure the devices are able to send traffic out to the
Internet and receive the corresponding traffic back?
Hide Feedback
Correct
6. Dahlia has just installed gigabit routers and
switches at the company's headquarters. Which of the following might she need
to do in order to allow the computers that came with 10/100 network ports to
transfer data at the faster speeds?
Hide Feedback
Correct
7. Sandra is attempting to resolve an issue on her
company's network: several users are unable to access one of the company's
intranet web servers. She has developed a theory and tested it to determine the
cause. Which of the following steps should she complete next?
Hide Feedback
Correct
8. Which of the following statements stands true?
Hide Feedback
Correct
9. Which of the following network devices does not
fall under the category of "end devices" as certified by CISCO?
Hide Feedback
Correct
10. Kyle is a property consultant, and he has hired you
as a programmer to make an application that sends data regarding property sites
to his client's base. He has also asked you to ensure that the application
should check whether the data has been received and if not, it should resend
the data. Which of the following protocols would you apply in such a scenario?
Hide Feedback
Correct
11. White Heavens Entertainment Ltd. has set up a new
website for informing people in detail about events that are being planned
across the city of Los Angeles. However, when a user tries to gain access to
its website to purchase tickets, there seems to be an IP error as a result of
which the site crashes. Analyze which of the layers of the OSI model must be
checked to fix this error.
Hide Feedback
Correct
12. Which of the following will act as the centralized
point of interconnection in reference to an organization's LAN, CAN, or WAN?
Hide Feedback
Correct
13. You have been sent to the University of Yale to
enable voice calls using a broadband connection instead of a regular analog
phone line. Which of the following protocols would you apply in such a
scenario?
Hide Feedback
Correct
14. What is a graphical representation of network
devices and connections known as?
Hide Feedback
Correct
15. Which
of the following diagrams is needed while tracking and troubleshooting
equipment installed in a rack?
Hide Feedback
Correct
16. Which of the following is not a recognized cabling
type for horizontal cabling as per the ANSI/TIA standards?
Hide Feedback
Correct
17. As a network engineer, you have been sent to
ZoomCar Enterprises to have a routine check on the network devices. In doing
so, you suddenly notice that there are still some old-generation routers
installed at certain points. You plan on replacing these old routers with the
new upgraded ones. At what life cycle phase can you remove an old device from
the network?
Hide Feedback
Correct
18. You are the DNS administrator and have been tasked
to hold alternative names for a host that is a newly established start-up
venturing into the business of ecommerce. The start-up wants its clients to be
directed to the appropriate page whenever they request for alternative names.
Which of the following resource records would you apply as a DNS administrator
in such a case?
Hide Feedback
Correct
19. Vialom network has organized an online web concert
featuring various well-known pop stars, which will stream globally. It has
contacted JMT internet services to help the company in delivering a single
video stream to multiple receivers so that there is minimal network traffic.
Analyze which of the following IPv6 addresses it should use in this case.
Hide Feedback
Correct
20. Computer A started a communication sequence with
Computer B that has a sequencing number of 300070. Computer B accepted the
request and sent an acknowledgment number of 300071. Until this point, no
payload has been exchanged. So far, the sequence numbers have increased by exactly
1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits
long. According to you, what will be the acknowledgment number for the return
message in this case?
Hide Feedback
Correct
21. You have been recently appointed by Jaylabs
Internet Solutions to verify the TCP/IP protocols that have been set up at
Heroku Industries for interorganizational purposes. On examining the TCP header
segment, you want to get a sense of the limit of the maximum bytes of data that
a computer can receive before returning an acknowledgment. Which of the
following fields in a TCP segment should you check in such a situation?
Hide Feedback
Correct
22. Meredith and Co. provides ISP services to a bulk of
the corporates in the Silicon Valley. However, due to the recent COVID
outbreak, a lot of the firms have started to allow their employees to work from
home. Ceratrix is one such company that wants to allow its employees to work
from home; however, certain features are only available to the employees when
they have access to their workstations in the organization. This basically
means that they would have to command the host computer. What remote access method
should be provided to Ceratrix to fulfill this requirement?
Hide Feedback
Correct
23. Which of the following protocols are used to
transmit IP and other kinds of messages through a tunnel?
Hide Feedback
Correct
24. Which of the following transceivers supports up to
10 Gbps?
Hide Feedback
Correct
25. You are a network administrator for an ISP that
wants to increase the amount of data that can be transmitted within the given
bandwidth. For this purpose, you decide to use multiplexing technologies so
that you can modulate the signals into different frequencies that can travel
simultaneously over a single channel only to be demultiplexed at the other end.
Which of the following multiplexing types will you use in this case?
Hide Feedback
Correct
26. Which
of the following 802.11 wireless standards has a theoretical throughput of 11
Mbps?
Hide Feedback
Correct
27. Local Brew is a small cafe operating in New York.
It has set up a free wireless network in its cafe to provide customers with
ease of Internet access. Recently, one of the customers lodged a complaint
against Local Brew regarding data theft from his emails, which has been traced
back to the cafe's public IP. Local Brew has informed Barton, who is the
network provider for the cafe, to rectify the issue. Which of the following
should Barton do to analyze and rectify the issue?
Hide Feedback
Correct
28. Michael Slater is the new technician in the office.
An issue has reduced the performance of the network, but he is unable to
diagnose the reason behind the issue. On checking the recommended geographic
range for the AP, he realizes that the clients are not within the recommended
distance. This has caused multiple data errors and a deterioration in
communication. Which of the following issues has caused the issue here?
Hide Feedback
Correct
29. Which
cloud characteristic allows a provider to limit or charge by the amount of
bandwidth, processing power, storage space, or client connections available to
customers?
Hide Feedback
Correct
30. Basil Telecommunications have hired you as a
network manager for providing a network system that will include redundant
processors, backup generators, and earthquake-resilient installation. You have
decided that the average downtime per year cannot be more than 5 minutes 15
seconds. Which of the following will you use in this scenario?
Hide Feedback
Correct
31. You have been appointed to design a subnet mask for
a network. The current IP address of the network is 192.168.89.0. You have been
requested by the network administrator to divide this local network into nine
subnets to correspond to the organization's nine different floors. How many
bits will you borrow from the host portion of the ID address in this scenario?
Hide Feedback
Correct
32. The headquarters of BBK Solutions has detected a
possible attack with the help of VLAN tags. Mathews is the head of the Network
Administration department in BBK Solutions, and he has to come up with security
measures to prevent such instances from occurring in the future. Which of the
following security measures should Matthews consider keeping the VLAN pathway
as the primary focus?
Hide Feedback
Correct
33. You as a network engineer want to create a subnet
that supports 16 hosts. Which of the following subnet masks will you use in
this scenario?
Hide Feedback
Correct
34. The organization where you are currently working as
a network administrator has a class A network address 10.0.0.0 with 40 subnets.
You want to add another 60 new subnets to the network. You would like to still
allow for the largest possible number of host IDs per subnet. Which of the
following subnet masks will you choose in this scenario?
Hide Feedback
Correct
35. Rodri
has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR
(regional Internet registry) has assigned the ISP a block of 32-bit routing
prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of
the following scenarios will help Rodri in calculating the total number of
possible subnets.
Hide Feedback
Correct
36. You are working as a network engineer with an ISP.
A query has come to you from a client who requires a guarantee of minimum
uptime percentages if the service goes down. Which of the following will you
choose in this scenario?
Hide Feedback
Correct
37. Which form of communication is well suited to users
who receive more information from the network than they send to it?
Hide Feedback
Correct
38. White Hawks runs a baseball stadium, and it would
like to set up a network that has a reasonable level of availability and
effectiveness so that fans can receive a close and strong signal throughput
when they watch a game. Analyze which of the following statements will help in
understanding why a 5G service is ideal in this scenario.
Hide Feedback
Correct
39. Which of the following is a type of DoS
(denial-of-service) attack that is bounced off uninfected computers before
being directed at the target?
Hide Feedback
Correct
40 .Hammond Industries has
appointed Gavin as the network administrator to set up a complete secured and
flawless network throughout the office premises. One of the employees has come
to him to fix an error message that keeps popping up every time he tries to
open the web browser. He also states that this error started popping up after
the external hard drive had been used to transfer some of the necessary
documents to the HR's office. Analyze what kind of malware might possibly be
behind this error.
Hide Feedback
Correct
41. An
organization hires you to handle the security policies of the organization. In
order to protect the organization's network from data breaches and potential
hacks, you decide to draft a policy that will require the employees of the
organization to adhere to a certain set of rules while accessing the network's
resources. To ensure that these rules are followed without fail, you decide to
impose certain penalties for situations where violations may occur. Which of
the following will help you achieve these standards?
Hide Feedback
Correct
42. Which of the following technologies selectively
filters or blocks traffic between networks?
Hide Feedback
Correct
43. Which
authorization method grants access to a user when the user's classification and
category match those of a resource?
Hide Feedback
Correct
44. You
have been working as a network engineer with an organization. You have decided
to implement information access control to limit the users and devices that can
get to your data and other network resources. For this purpose, you plan on
using a username and password as a measure of security to grant any user access
to your organization's resources. Which of the elements of the AAAA acronym
will you use to apply this security measure?
Hide Feedback
Correct
45. Yugen
is a network administrator who is in the process of configuring CoPP (control
plane policing) on a router. In this scenario, ICMP (Internet Network Control
Protocol) traffic is permitted with no limits from one trusted device. All
other ICMP traffic is limited and, when exceeding that limit, is dropped.
Analyze which of the following commands Yugen should use to create a class map
named limit-icmp that will classify traffic according to defined criteria such
as an ACL.
Hide Feedback
Correct
46. Which network monitoring method can be used to
ensure that all traffic sent to any port on a switch is also sent to a device
connected to the mirrored port?
Hide Feedback
Correct
47. Trevor
is working as a network engineer at Spring Oaks High School. The school's
management has been facing some issues while handling network traffic. Trevor
wants to check the bandwidth as he assumes that the issues faced by the
management are related to bandwidth errors. Which of the following technologies
should Trevor use to ensure some traffic gets priority over other traffic so
the most important traffic gets through even during times of congestion?
Hide Feedback
Correct
48. Which
of the following power flaws is also called a sag?
Hide Feedback
Correct
49. Which
of the following backs up only the data that has changed since the last backup?
Hide Feedback
Correct
50. Agar
is a network analyst at BMV, a mobile network. He efficiently manages the
network's QoS (Quality of Service) configurations for adjusting the priority a
network assigns to various types of transmissions. He ensures timely delivery
of the most important traffic while optimizing performance for all users. The
management at BMV wants to conduct a pilot test for a new product, and they
have requested Agar to limit the momentary throughput rate for an interface.
Analyze which of the following Agar should use in this scenario.
Hide Feedback
Correct
Final Exam
1. Which cloud characteristic allows a provider to
limit or charge by the amount of bandwidth, processing power, storage space, or
client connections available to customers?
Hide Feedback
Correct
Solution
Correct Response
b
2. Computer A started a communication sequence with
Computer B that has a sequencing number of 300070. Computer B accepted the
request and sent an acknowledgment number of 300071. Until this point, no
payload has been exchanged. So far, the sequence numbers have increased by exactly
1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits
long. According to you, what will be the acknowledgment number for the return
message in this case?
Hide Feedback
Correct
Solution
Correct Response
b
3. You have been appointed to design a subnet mask for
a network. The current IP address of the network is 192.168.89.0. You have been
requested by the network administrator to divide this local network into nine
subnets to correspond to the organization's nine different floors. How many
bits will you borrow from the host portion of the ID address in this scenario?
Hide Feedback
Correct
Solution
Correct Response
c
4. Which of the following is a type of DoS
(denial-of-service) attack that is bounced off uninfected computers before
being directed at the target?
Hide Feedback
Correct
Solution
Correct Response
c
5. Vialom network has organized an online web concert
featuring various well-known pop stars, which will stream globally. It has
contacted JMT internet services to help the company in delivering a single
video stream to multiple receivers so that there is minimal network traffic.
Analyze which of the following IPv6 addresses it should use in this case.
Hide Feedback
Correct
Solution
Correct Response
b
6. White Heavens Entertainment Ltd. has set up a new
website for informing people in detail about events that are being planned
across the city of Los Angeles. However, when a user tries to gain access to
its website to purchase tickets, there seems to be an IP error as a result of
which the site crashes. Analyze which of the layers of the OSI model must be
checked to fix this error.
Hide Feedback
Correct
Solution
Correct Response
b
7. You are a network administrator for an ISP that
wants to increase the amount of data that can be transmitted within the given
bandwidth. For this purpose, you decide to use multiplexing technologies so
that you can modulate the signals into different frequencies that can travel
simultaneously over a single channel only to be demultiplexed at the other end.
Which of the following multiplexing types will you use in this case?
Hide Feedback
Correct
Solution
Correct Response
d
8.Which of the following statements stands true?
Hide Feedback
Correct
9. Which authorization method grants access to a user
when the user's classification and category match those of a resource?
Hide Feedback
Correct
Solution
Correct Response
b
10.Subnetting,
which alters the rules of classful IPv4 addressing, is known as _____.
Hide Feedback
Correct
11. The part which identifies the network in an IPv4
address is known as _____.
Hide Feedback
Correct
Solution
Correct Response
b
12. You as a network engineer want to create a subnet
that supports 16 hosts. Which of the following subnet masks will you use in
this scenario?
Hide Feedback
Correct
Solution
Correct Response
c
13. Which form of communication is well suited to users
who receive more information from the network than they send to it?
Hide Feedback
Correct
Solution
Correct Response
a
14. Which of the following protocols will an Oracle
Database use to communicate with other Oracle Databases?
Hide Feedback
Correct
Solution
Correct Response
c
15. Which of the following will act as the centralized
point of interconnection in reference to an organization's LAN, CAN, or WAN?
Hide Feedback
Correct
Solution
Correct Response
c
16. You are working as a network engineer with an ISP.
A query has come to you from a client who requires a guarantee of minimum
uptime percentages if the service goes down. Which of the following will you
choose in this scenario?
Hide Feedback
Correct
Solution
Correct Response
d
17. hite Hawks runs a baseball stadium, and it would
like to set up a network that has a reasonable level of availability and
effectiveness so that fans can receive a close and strong signal throughput
when they watch a game. Analyze which of the following statements will help in
understanding why a 5G service is ideal in this scenario.
Hide Feedback
Correct
Solution
Correct Response
d
18. Kyle is a property consultant, and he has hired you
as a programmer to make an application that sends data regarding property sites
to his client's base. He has also asked you to ensure that the application
should check whether the data has been received and if not, it should resend
the data. Which of the following protocols would you apply in such a scenario?
Hide Feedback
Correct
Solution
Correct Response
a
19. An organization hires you to handle the security
policies of the organization. In order to protect the organization's network
from data breaches and potential hacks, you decide to draft a policy that will
require the employees of the organization to adhere to a certain set of rules
while accessing the network's resources. To ensure that these rules are
followed without fail, you decide to impose certain penalties for situations
where violations may occur. Which of the following will help you achieve these
standards?
Hide Feedback
Correct
Solution
Correct Response
a
20. Which of the following diagrams is needed while
tracking and troubleshooting equipment installed in a rack?
Hide Feedback
Correct
Solution
Correct Response
c
21. The headquarters of BBK Solutions has detected a
possible attack with the help of VLAN tags. Mathews is the head of the Network
Administration department in BBK Solutions, and he has to come up with security
measures to prevent such instances from occurring in the future. Which of the
following security measures should Matthews consider keeping the VLAN pathway
as the primary focus?
Hide Feedback
Correct
Solution
Correct Response
c
22. Which of the following is not a recognized cabling
type for horizontal cabling as per the ANSI/TIA standards?
Hide Feedback
Correct
Solution
Correct Response
b
23. Rodri has been contracted by an ISP to set up an
IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the
ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48
site prefix. Analyze which of the following scenarios will help Rodri in
calculating the total number of possible subnets.
Hide Feedback
Correct
Solution
Correct Response
c
24. Local Brew is a small cafe operating in New York.
It has set up a free wireless network in its cafe to provide customers with
ease of Internet access. Recently, one of the customers lodged a complaint
against Local Brew regarding data theft from his emails, which has been traced
back to the cafe's public IP. Local Brew has informed Barton, who is the
network provider for the cafe, to rectify the issue. Which of the following
should Barton do to analyze and rectify the issue?
Hide Feedback
Correct
Solution
Correct Response
c
25. Which of the following backs up only the data that
has changed since the last backup?
Hide Feedback
Correct
Solution
Correct Response
b
26. The organization where you are currently working as
a network administrator has a class A network address 10.0.0.0 with 40 subnets.
You want to add another 60 new subnets to the network. You would like to still
allow for the largest possible number of host IDs per subnet. Which of the
following subnet masks will you choose in this scenario?
Hide Feedback
Correct
Solution
Correct Response
b
27. Which network monitoring method can be used to
ensure that all traffic sent to any port on a switch is also sent to a device
connected to the mirrored port?
Hide Feedback
Correct
Solution
Correct Response
b
28. You have been recently appointed by Jaylabs
Internet Solutions to verify the TCP/IP protocols that have been set up at
Heroku Industries for interorganizational purposes. On examining the TCP header
segment, you want to get a sense of the limit of the maximum bytes of data that
a computer can receive before returning an acknowledgment. Which of the
following fields in a TCP segment should you check in such a situation?
Hide Feedback
Correct
Solution
Correct Response
a
29. Which of the following transceivers supports up to
10 Gbps?
Hide Feedback
Correct
Solution
Correct Response
a
30. Which of the following server racks would you use
for a bolt-free mounting?
Hide Feedback
Correct
Solution
Correct Response
d
31. You have been working as a network engineer with an
organization. You have decided to implement information access control to limit
the users and devices that can get to your data and other network resources.
For this purpose, you plan on using a username and password as a measure of
security to grant any user access to your organization's resources. Which of
the elements of the AAAA acronym will you use to apply this security measure?
Hide Feedback
Correct
Solution
Correct Response
d
32. Basil Telecommunications have hired you as a
network manager for providing a network system that will include redundant
processors, backup generators, and earthquake-resilient installation. You have
decided that the average downtime per year cannot be more than 5 minutes 15
seconds. Which of the following will you use in this scenario?
Hide Feedback
Correct
Solution
Correct Response
d
33. Agar is a network analyst at BMV, a mobile network.
He efficiently manages the network's QoS (Quality of Service) configurations
for adjusting the priority a network assigns to various types of transmissions.
He ensures timely delivery of the most important traffic while optimizing
performance for all users. The management at BMV wants to conduct a pilot test
for a new product, and they have requested Agar to limit the momentary
throughput rate for an interface. Analyze which of the following Agar should use
in this scenario.
Hide Feedback
Correct
Solution
Correct Response
c
34. You have been sent to the University of Yale to
enable voice calls using a broadband connection instead of a regular analog
phone line. Which of the following protocols would you apply in such a
scenario?
Hide Feedback
Correct
Solution
Correct Response
a
35. Hammond Industries has appointed Gavin as the
network administrator to set up a complete secured and flawless network
throughout the office premises. One of the employees has come to him to fix an
error message that keeps popping up every time he tries to open the web
browser. He also states that this error started popping up after the external
hard drive had been used to transfer some of the necessary documents to the
HR's office. Analyze what kind of malware might possibly be behind this error.
Hide Feedback
Correct
Solution
Correct Response
d
36. Which of the following protocols are used to
transmit IP and other kinds of messages through a tunnel?
Hide Feedback
Correct
Solution
Correct Response
b
37. Which of the following 802.11 wireless standards
has a theoretical throughput of 11 Mbps?
Hide Feedback
Correct
Solution
Correct Response
a
38. Trevor is working as a network engineer at Spring
Oaks High School. The school's management has been facing some issues while
handling network traffic. Trevor wants to check the bandwidth as he assumes
that the issues faced by the management are related to bandwidth errors. Which
of the following technologies should Trevor use to ensure some traffic gets
priority over other traffic so the most important traffic gets through even
during times of congestion?
Hide Feedback
Correct
Solution
Correct Response
b
39. You run a website called Offhand that sells
exclusive handmade home decor items. On Mother's Day, the website unexpectedly
receives a burst of traffic following the marketing campaign designed for this
occasion. Thankfully, you are equipped with a good cloud service model and
hence you are able to increase the cloud resources the website needs without disrupting
your web services. Which of the following cloud characteristics helped you
manage the situation easily?
Hide Feedback
Correct
Solution
Correct Response
c
40. What is a graphical representation of network
devices and connections known as?
Hide Feedback
Correct
Solution
Correct Response
a
41. Which of the following power flaws is also called a
sag?
Hide Feedback
Correct
Solution
Correct Response
a
42. Yugen is a network administrator who is in the
process of configuring CoPP (control plane policing) on a router. In this
scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no
limits from one trusted device. All other ICMP traffic is limited and, when
exceeding that limit, is dropped. Analyze which of the following commands Yugen
should use to create a class map named limit-icmp that will classify traffic
according to defined criteria such as an ACL.
Hide Feedback
Correct
Solution
Correct Response
a
43. As a network engineer, you have been sent to
ZoomCar Enterprises to have a routine check on the network devices. In doing
so, you suddenly notice that there are still some old-generation routers
installed at certain points. You plan on replacing these old routers with the
new upgraded ones. At what life cycle phase can you remove an old device from
the network?
Hide Feedback
Correct
Solution
Correct Response
b
44. Which of the following client-server applications
use Apache and Nginx?
Hide Feedback
Correct
Solution
Correct Response
c
45. Which wireless technology is used to track fitness
activity levels and geographic movement?
Hide Feedback
Correct
Solution
Correct Response
a
46. You are the DNS administrator and have been tasked
to hold alternative names for a host that is a newly established start-up
venturing into the business of ecommerce. The start-up wants its clients to be
directed to the appropriate page whenever they request for alternative names.
Which of the following resource records would you apply as a DNS administrator
in such a case?
Hide Feedback
Correct
Solution
Correct Response
b
47. Which of the following technologies selectively
filters or blocks traffic between networks?
Hide Feedback
Correct
Solution
Correct Response
d
48. Michael Slater is the new technician in the office.
An issue has reduced the performance of the network, but he is unable to
diagnose the reason behind the issue. On checking the recommended geographic
range for the AP, he realizes that the clients are not within the recommended
distance. This has caused multiple data errors and a deterioration in
communication. Which of the following issues has caused the issue here?
Hide Feedback
Correct
Solution
Correct Response
a
49. Which of the following network devices does not
fall under the category of "end devices" as certified by CISCO?
Hide Feedback
Correct
Solution
Correct Response
b
50. Meredith and Co. provides ISP services to a bulk of
the corporates in the Silicon Valley. However, due to the recent COVID
outbreak, a lot of the firms have started to allow their employees to work from
home. Ceratrix is one such company that wants to allow its employees to work
from home; however, certain features are only available to the employees when
they have access to their workstations in the organization. This basically
means that they would have to command the host computer. What remote access method
should be provided to Ceratrix to fulfill this requirement?
Hide Feedback
Correct
Solution
Correct Response
d
Comments
Post a Comment