Skip to main content

IS 5203 WEEK 8 ( all solutions)

Virtual Machine Lab 12.3

 

3. Question

Actioned

Item completed: 12/12/2022 10:11 AM

Value: 1

Answer:
The hard drives are all similarly configured
The server has the same roles installed as other servers in the cluster
The server has a network interface card configured the same as the other server in the cluster

PASS

4. Question

Actioned

Item completed: 12/12/2022 10:11 AM

Value: 1

Answer: PLCluster

PASS

5. Question

Actioned

Item completed: 12/12/2022 10:11 AM

Value: 1

Answer: Recovery Point Objective (RPO)

PASS

6. Question

Actioned

Item completed: 12/12/2022 10:11 AM

Value: 1

Answer:
Install the Windows Server Backup feature
Identify and configure storage solution for the backup

PASS

7. Question

Actioned

Item completed: 12/12/2022 10:11 AM

Value: 1

Answer: Warm

PASS

Score : 5 out of 5 (100%)

 

 

 

 

Quiz: Module 12

 

 1.  While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server?

a. Wireshark

b. NetFlow

c. Spiceworks

d. iPerf

Hide Feedback

Correct

 

2. One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

a. Jabbers

b. Giants

c. Top listeners

d. Top talkers

Hide Feedback

Correct

 

 

3.What command requests the next record in an SNMP log?

a. SNMP Trap

b. SNMP Get Response

c. SNMP Get Request

d. SNMP Get Next

Hide Feedback

Correct

4. What port do SNMP agents listen on?

a. Port 162

b. Port 20

c. Port 161

d. Port 21

Hide Feedback

Correct

 

5. Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

a. Flow control

b. Traffic shaping

c. Power management

d. Congestion control

Hide Feedback

Correct

 

6. What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

a. DiffServ

b. Time to Live

c. Priority Code Point

d. Traffic Class

Hide Feedback

Correct

 

7. Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

a. Dual power supplies

b. Generator

c. Standby UPS

d. Online UPS

Hide Feedback

Correct

 

8. Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

a. Standby site

b. Cold site

c. Hot site

d. Warm site

Hide Feedback

Correct

 

9. Which log type is used to prove who did what and when?

a. Traffic log

b. Syslog

c. System log

d. Audit log

Hide Feedback

Correct

 

10. Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?

a. Selective repeat sliding window

b. Stop-and-wait

c. Go-back-n sliding window

d. Choke packet

Hide Feedback

Correct

 

 

 

 

 

Post-Assessment Quiz

1.      1. Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into?

a. Layer 2

b. Layer 3

c. Layer 4

d. Layer 6

2.      Hide Feedback

3.      Correct

2. All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use?

a. star

b. ring

c. mesh

d. bus

Hide Feedback

Correct

 

3. Which of the following protocols might someone use to send an email?

a. HTTP

b. SMTP

c. FTP

d. RDP

Hide Feedback

Correct

 

4. Kumail wants to check his bank account balance to see if a transaction has cleared from a purchase he made the previous day. Which of the following protocols would most likely be used to do this?

a. RDP

b. HTTPS

c. HTTP

d. FTP

Hide Feedback

Correct

 

5. The network administrator for an organization needs to install a network at his company's new branch office. The branch office will have 30 computers that will all connect to the Internet, where they will share a single public IP address. Which of the following devices must the network administrator install to ensure the devices are able to send traffic out to the Internet and receive the corresponding traffic back?

a. router

b. token ring

c. hub

d. switch

Hide Feedback

Correct

 

6. Dahlia has just installed gigabit routers and switches at the company's headquarters. Which of the following might she need to do in order to allow the computers that came with 10/100 network ports to transfer data at the faster speeds?

a. Install a hub at each user's workstation

b. Issue new tokens to each user

c. Configure the routers to push out updates to the computers advertising the new speeds

d. Install a NIC on each of the computers

Hide Feedback

Correct

 

7. Sandra is attempting to resolve an issue on her company's network: several users are unable to access one of the company's intranet web servers. She has developed a theory and tested it to determine the cause. Which of the following steps should she complete next?

a. Establish a plan for resolving the problem

b. Document findings, actions, and outcomes

c. Identify the problem and its symptoms

d. Implement the solution or escalate the problem

Hide Feedback

Correct

8. Which of the following statements stands true?

a. The DBMS does not support a multiuser environment.

b. HTTP is a secured protocol that provides secure transmission.

c. An email can be downloaded to the client computer using POP3.

d. FTP servers provide secure encryption for file transfer.

Hide Feedback

Correct

 

9. Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

a. File server

b. Router

c. Smartphone

d. Network printer

Hide Feedback

Correct

 

10. Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

a. Simple Network Management Protocol

b. Internet Message Access Protocol

c. User Datagram Protocol

d. Transmission Control Protocol

Hide Feedback

Correct

 

11. White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

a. Presentation layer

b. Network layer

c. Transport layer

d. Data link layer

Hide Feedback

Correct

 

12. Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?

a. Demarc Point

b. Data Room

c. MDF


d. VoIP telephone equipment

Hide Feedback

Correct

 

13. You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario?

a. VoIP

b. IMAP4

c. SIP

d. POP3

Hide Feedback

Correct

 

14. What is a graphical representation of network devices and connections known as?

a. A rack diagram

b. A wiring diagram

c. A Zenmap

d. A network diagram

Hide Feedback

Correct

 

15. Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack?

a. A network diagram

b. A network mapper

c. A rack diagram

d. A wiring diagram

Hide Feedback

Correct

 

16. Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

a. Fiber optic cable

b. Patch cable

c. UTP

d. STP

Hide Feedback

Correct

 

17. As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?

a. The requirement phase

b. The development phase

c. The implementation phase

d. The documentation and maintenance phase

Hide Feedback

Correct

 

18. You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

a. AAAA record

b. CNAME record

c. PTR record

d. MX record

Hide Feedback

Correct

 

19. Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

a. Multicast address

b. Link local address

c. Unicast address

d. Loopback address

Hide Feedback

Correct

 

20. Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

a. 300800

b. 300871

c. 300870

d. 300072

Hide Feedback

Correct

 

21. You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

a. Options

b. Destination port

c. Window size

d. Header length

Hide Feedback

Correct

 

22. Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?

a. VPN

b. Terminal emulation

c. FTPS

d. Remote file access

Hide Feedback

Correct

 

23. Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

a. OpenVPN

b. IKEv2

c. GRE

d. L2TP

Hide Feedback

Correct

 

24. Which of the following transceivers supports up to 10 Gbps?

a. SFP

b. QSFP

c. SFP+

d. XFP

Hide Feedback

Correct

 

25. You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case?

a. TDM

b. WDM

c. FDM

d. STDM

Hide Feedback

Correct

 

26. Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

a. 802.11b

b. 802.11a

c. 802.11n

d. 802.11ax

Hide Feedback

Correct

 

27. Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?

a. He should check for guest network preferences.

b. He should check if the antenna has been misplaced.

c. He should check whether the geofencing security option has been enabled.

d. He should check whether captive portal user reminders have been set up.

Hide Feedback

Correct

 

28. Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

a. Insufficient wireless coverage

b. Interference

c. Channel overlap

d. Simultaneous wired and wireless connections

Hide Feedback

Correct

 

29. Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?

a. Resource pooling

b. Rapid elasticity

c. Broad network access

d. Measured service

Hide Feedback

Correct

 

30. Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario?

a. Four 9s

b. Three 9s

c. Five 9s

d. Two 9s

Hide Feedback

Correct

 

31. You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

a. Three bits

b. Five bits

c. Two bits

d. Four bits

Hide Feedback

Correct

 

32. The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

a. The default VLAN should not be used.

b. Auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled.

c. All VLAN ranges should be accepted on each trunk.

d. The native VLAN should be changed to a used VLAN ID.

Hide Feedback

Correct

 

33. You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

a. 255.255.255.252

b. 255.255.255.240

c. 255.255.255.248

d. 255.255.255.224

Hide Feedback

Correct

 

34. The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

a. 255.240.0.0

b. 255.248.0.0

c. 255.252.0.0

d. 255.254.0.0

Hide Feedback

Correct

 

35. Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.

a. MIL Ltd. can create up to 256 subnets.

b. MIL Ltd. can create up to 65,536 subnets.

c. Rodri should use the 2n = Y formula to calculate the subnet.

d. MIL Ltd. can create only one single subnet.

Hide Feedback

Correct

 

36. You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario?

a. PTSN

b. DIA

c. DSL

d. Broadband

Hide Feedback

Correct

 

37. Which form of communication is well suited to users who receive more information from the network than they send to it?

a. ADSL

b. SDSL

c. xDSL

d. VDSL

Hide Feedback

Correct

 

38. White Hawks runs a baseball stadium, and it would like to set up a network that has a reasonable level of availability and effectiveness so that fans can receive a close and strong signal throughput when they watch a game. Analyze which of the following statements will help in understanding why a 5G service is ideal in this scenario.

a. Higher frequency for bands would increase the throughput.

b. Client volume will increase the throughput.

c. The cell density for the network must be close.

d. Wider channels would help increase the speed.

Hide Feedback

Correct

 

39. Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

a. Amplified DRDoS attack

b. DDoS attack

c. DRDoS attack

d. PDoS attack

Hide Feedback

Correct

 

40 .Hammond Industries has appointed Gavin as the network administrator to set up a complete secured and flawless network throughout the office premises. One of the employees has come to him to fix an error message that keeps popping up every time he tries to open the web browser. He also states that this error started popping up after the external hard drive had been used to transfer some of the necessary documents to the HR's office. Analyze what kind of malware might possibly be behind this error.

a. Virus

b. Trojan horse

c. Ransomware

d. Worm

Hide Feedback

Correct

 

41. An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?

a. NDA

b. Password policy

c. PUA

d. AUP

Hide Feedback

Correct

 

42. Which of the following technologies selectively filters or blocks traffic between networks?

a. IPS

b. Firewall

c. IDS

d. Proxy server

Hide Feedback

Correct

 

43. Which authorization method grants access to a user when the user's classification and category match those of a resource?

a. DAC

b. SoD

c. RBAC

d. MAC

Hide Feedback

Correct

 

44. You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization's resources. Which of the elements of the AAAA acronym will you use to apply this security measure?

a. Authentication

b. Authorization

c. Accounting

d. Auditing

Hide Feedback

Correct

 

45. Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL.

a. class limit-icmp

b. match access-group

c. class-map limit-icmp

d. policy-map

Hide Feedback

Correct

 

 

46. Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

a. Wireless monitoring

b. Reporting

c. Port mirroring

d. In-line monitoring

Hide Feedback

Correct

 

47. Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?

a. Flow control

b. QoS

c. Congestion control

d. Traffic shaping

Hide Feedback

Correct

 

48. Which of the following power flaws is also called a sag?

a. Surge

b. Noise

c. Blackout

d. Brownout

Hide Feedback

Correct

 

49. Which of the following backs up only the data that has changed since the last backup?

a. Incremental backup

b. Differential backup

c. Full backup

d. Cloud backup

Hide Feedback

Correct

 

50. Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario.

a. DiffServ

b. Flow control

c. CoS

d. Traffic policing

Hide Feedback

Correct

 

 

Final Exam

1. Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?

a. Rapid elasticity

b. Measured service

c. Broad network access

d. Resource pooling

Hide Feedback

Correct

Solution

Correct Response

b

 

2. Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

a. 300072

b. 300871

c. 300870

d. 300800

Hide Feedback

Correct

Solution

Correct Response

b

 

3. You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

a. Three bits

b. Five bits

c. Four bits

d. Two bits

Hide Feedback

Correct

Solution

Correct Response

c

 

4. Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

a. DDoS attack

b. PDoS attack

c. DRDoS attack

d. Amplified DRDoS attack

Hide Feedback

Correct

Solution

Correct Response

c

 

5. Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

a. Loopback address

b. Multicast address

c. Link local address

d. Unicast address

Hide Feedback

Correct

Solution

Correct Response

b

 

6. White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

a. Presentation layer

b. Network layer

c. Data link layer

d. Transport layer

Hide Feedback

Correct

Solution

Correct Response

b

 

7. You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case?

a. WDM

b. TDM

c. STDM

d. FDM

Hide Feedback

Correct

Solution

Correct Response

d


8.Which of the following statements stands true?


a. HTTP is a secured protocol that provides secure transmission.

b. FTP servers provide secure encryption for file transfer.

c. An email can be downloaded to the client computer using POP3.

d. The DBMS does not support a multiuser environment.

Hide Feedback

Correct

 

9. Which authorization method grants access to a user when the user's classification and category match those of a resource?

a. DAC

b. MAC

c. SoD

d. RBAC

Hide Feedback

Correct

Solution

Correct Response

b

 

10.Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

a. classless addressing

b. relay agent

c. VLSM

d. IP helper address

Hide Feedback

Correct

 

11. The part which identifies the network in an IPv4 address is known as _____.

a. the site prefix

b. the network ID

c. the VTP

d. the host ID

Hide Feedback

Correct

Solution

Correct Response

b

 

12. You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

a. 255.255.255.252

b. 255.255.255.248

c. 255.255.255.224

d. 255.255.255.240

Hide Feedback

Correct

Solution

Correct Response

c

 

13. Which form of communication is well suited to users who receive more information from the network than they send to it?

a. ADSL

b. xDSL

c. VDSL

d. SDSL

Hide Feedback

Correct

Solution

Correct Response

a

14. Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?

a. LDAP

b. SMB

c. SQLnet

d. TFTP

Hide Feedback

Correct

Solution

Correct Response

c

 

15. Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?

a. VoIP telephone equipment

b. Demarc Point

c. MDF

d. Data Room

Hide Feedback

Correct

Solution

Correct Response

c

16. You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario?

a. DSL

b. PTSN

c. Broadband

d. DIA

Hide Feedback

Correct

Solution

Correct Response

d

 

17. hite Hawks runs a baseball stadium, and it would like to set up a network that has a reasonable level of availability and effectiveness so that fans can receive a close and strong signal throughput when they watch a game. Analyze which of the following statements will help in understanding why a 5G service is ideal in this scenario.

a. Higher frequency for bands would increase the throughput.

b. Wider channels would help increase the speed.

c. Client volume will increase the throughput.

d. The cell density for the network must be close.

Hide Feedback

Correct

Solution

Correct Response

d

 

18. Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

a. Transmission Control Protocol

b. User Datagram Protocol

c. Simple Network Management Protocol

d. Internet Message Access Protocol

Hide Feedback

Correct

Solution

Correct Response

a

 

19. An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?

a. AUP

b. PUA

c. NDA

d. Password policy

Hide Feedback

Correct

Solution

Correct Response

a

 

20. Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack?

a. A network mapper

b. A wiring diagram

c. A rack diagram

d. A network diagram

Hide Feedback

Correct

Solution

Correct Response

c

 

21. The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

a. Auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled.

b. All VLAN ranges should be accepted on each trunk.

c. The default VLAN should not be used.

d. The native VLAN should be changed to a used VLAN ID.

Hide Feedback

Correct

Solution

Correct Response

c

 

22. Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

a. UTP

b. Patch cable

c. Fiber optic cable

d. STP

Hide Feedback

Correct

Solution

Correct Response

b

 

23. Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.

a. MIL Ltd. can create only one single subnet.

b. MIL Ltd. can create up to 256 subnets.

c. MIL Ltd. can create up to 65,536 subnets.

d. Rodri should use the 2n = Y formula to calculate the subnet.

Hide Feedback

Correct

Solution

Correct Response

c

 

24. Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?

a. He should check whether the geofencing security option has been enabled.

b. He should check for guest network preferences.

c. He should check whether captive portal user reminders have been set up.

d. He should check if the antenna has been misplaced.

Hide Feedback

Correct

Solution

Correct Response

c

 

25. Which of the following backs up only the data that has changed since the last backup?

a. Full backup

b. Incremental backup

c. Cloud backup

d. Differential backup

Hide Feedback

Correct

Solution

Correct Response

b

 

26. The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

a. 255.252.0.0

b. 255.254.0.0

c. 255.240.0.0

d. 255.248.0.0

Hide Feedback

Correct

Solution

Correct Response

b

 

27. Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

a. Wireless monitoring

b. Port mirroring

c. Reporting

d. In-line monitoring

Hide Feedback

Correct

Solution

Correct Response

b

28. You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

a. Window size

b. Header length

c. Options

d. Destination port

Hide Feedback

Correct

Solution

Correct Response

a

 

29. Which of the following transceivers supports up to 10 Gbps?

a. XFP

b. QSFP

c. SFP+

d. SFP

Hide Feedback

Correct

Solution

Correct Response

a

 

30. Which of the following server racks would you use for a bolt-free mounting?

a. Nonthreaded racks

b. Threaded racks

c. Round-hole racks

d. Square-hole racks

Hide Feedback

Correct

Solution

Correct Response

d

 

31. You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization's resources. Which of the elements of the AAAA acronym will you use to apply this security measure?

a. Authorization

b. Accounting

c. Auditing

d. Authentication

Hide Feedback

Correct

Solution

Correct Response

d

 

32. Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario?

a. Three 9s

b. Two 9s

c. Four 9s

d. Five 9s

Hide Feedback

Correct

Solution

Correct Response

d

 

33. Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario.

a. CoS

b. Flow control

c. Traffic policing

d. DiffServ

Hide Feedback

Correct

Solution

Correct Response

c

 

34. You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario?

a. VoIP

b. SIP

c. IMAP4

d. POP3

Hide Feedback

Correct

Solution

Correct Response

a

35. Hammond Industries has appointed Gavin as the network administrator to set up a complete secured and flawless network throughout the office premises. One of the employees has come to him to fix an error message that keeps popping up every time he tries to open the web browser. He also states that this error started popping up after the external hard drive had been used to transfer some of the necessary documents to the HR's office. Analyze what kind of malware might possibly be behind this error.

a. Worm

b. Ransomware

c. Trojan horse

d. Virus

Hide Feedback

Correct

Solution

Correct Response

d

36. Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

a. L2TP

b. GRE

c. OpenVPN

d. IKEv2

Hide Feedback

Correct

Solution

Correct Response

b

 

37. Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

a. 802.11b

b. 802.11a

c. 802.11ax

d. 802.11n

Hide Feedback

Correct

Solution

Correct Response

a

 

38. Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?

a. Traffic shaping

b. QoS

c. Congestion control

d. Flow control

Hide Feedback

Correct

Solution

Correct Response

b

39. You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?

a. Broad network access

b. Measured service

c. Rapid elasticity

d. Resource pooling

Hide Feedback

Correct

Solution

Correct Response

c

 

40. What is a graphical representation of network devices and connections known as?

a. A network diagram

b. A rack diagram

c. A Zenmap

d. A wiring diagram

Hide Feedback

Correct

Solution

Correct Response

a

 

41. Which of the following power flaws is also called a sag?

a. Brownout

b. Noise

c. Surge

d. Blackout

Hide Feedback

Correct

Solution

Correct Response

a

 

42. Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL.

a. class-map limit-icmp

b. match access-group

c. policy-map

d. class limit-icmp

Hide Feedback

Correct

Solution

Correct Response

a

 

43. As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?

a. The documentation and maintenance phase

b. The implementation phase

c. The requirement phase

d. The development phase

Hide Feedback

Correct

Solution

Correct Response

b

 

44. Which of the following client-server applications use Apache and Nginx?

a. FTP services

b. DNS service

c. Web service

d. Email services

Hide Feedback

Correct

Solution

Correct Response

c

 

45. Which wireless technology is used to track fitness activity levels and geographic movement?

a. ANT+

b. Bluetooth

c. NFC

d. Infrared

Hide Feedback

Correct

Solution

Correct Response

a

 

46. You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

a. PTR record

b. CNAME record

c. MX record

d. AAAA record

Hide Feedback

Correct

Solution

Correct Response

b

 

47. Which of the following technologies selectively filters or blocks traffic between networks?

a. IDS

b. Proxy server

c. IPS

d. Firewall

Hide Feedback

Correct

Solution

Correct Response

d

 

48. Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

a. Insufficient wireless coverage

b. Channel overlap

c. Interference

d. Simultaneous wired and wireless connections

Hide Feedback

Correct

Solution

Correct Response

a

 

49. Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

a. Smartphone

b. Router

c. Network printer

d. File server

Hide Feedback

Correct

Solution

Correct Response

b

 

50. Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?

a. VPN

b. Remote file access

c. FTPS

d. Terminal emulation

Hide Feedback

Correct

Solution

Correct Response

d

 


Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh