Skip to main content

IS-5203 Network Management [2024 Jan Syllabus]

 

QUIZ 14

1. Which of these should not be updated to reflect the changed state of the network?

A. Notification to change

2. Which of these represents the amount of time a system will be down or unavailable during the implementation of changes?

A. Maintenance window

3. Which of these is a plan for reversing changes and recovering from any adverse effects from the changes?

A. Rollback

4. Which of these indicates the way of properly installing or removing software on the servers?

A. Procedure

5. You have made the release of product plans available only to the Sales group members. Which tool can prevent the emailing of a document to anyone other than Sales group members?

A. DLP

6. To what type of devices are the BYOD policies applied?

A. Mobile

7. Which policy shows the time before a password can be reused?

A. Password history

8. Which of the following is not a device hardening technique?

A. Deploy an access control vestibule.

9. A network baseline delimits when bandwidth is available and the amount of that bandwidth.

A. True

10. Which of these connects equipment (inside plant) to cables and subscriber carrier equipment (outside plant)?

A. MDF

Quiz-15

 

1. Which of these provides a method to join multiple physical switches into a single logical switching unit?

A. Switch stacking

2. Which of the following protocols gives the users a way to configure more than one physical router to appear as if they were only a single logical one?

A. FHRP

3. Which of the following fire suppression systems is not a good choice for locating computing equipment?

A. Deluge

4. Which site is a leased facility that contains all the resources needed for full operation?

A. Hot

5. Which of the following statements is true about the HSRP group?

A. It has only one active router, at least one standby router, and many listening routers.

6. What is the HSRP group number of the group with the HSRP MAC address as 0000.0c07.ac0a?

A. 10

7. Which of the following timers have the default interval of 3 seconds and identifies the state that each router is in?

A. Hello

8. Which of these is an IEEE standard (RFC 2338) for router redundancy?

A. VRRP

9. Which of these is a measure back in time when the data was preserved in a usable format, most often to the recent backup?

A. RPO

10. Which of the following backup types does not include the data?

A. System state


Quiz-16

1. Which of the following concerns should the users have when they encrypt data before sending it?

A. Confidentiality

2. Which of these is not an external threat?

A. Accidental file deletion by an ex-employee

3. Which of these is maintained by the MITRE Corporation and includes entries that describe a vulnerability in detail, using a number and letter system?

A. CVE

4. Which of these is an attack where no known fix exists?

A. Zero-day

5. Which of these occurs when a threat agent takes advantage of weakness and uses it to advance an attack?

A. Exploit

6. Which principle specifies that the users should be given access only to resources required to do their job?

A. Least privilege

7. Which of the following access methods allows the new employees to be simply placed in the group and inherit all the required permissions?

A. Role-based

8. You have decided that the default permission for all files will be 'No Access'. What principle are you following?

A. Zero Trust

9. Which of these is a method of checking the security health of network hosts before they're allowed to access the network?

A. NAC

10. Which of these are you following when you are encrypting a file, applying access permissions to it, and locking the door to the room where the server on which the file resides is located?

A. Defense-in-depth

QUIZ-17

1. Which of these is an AP that is not under the user's control but is used to perform a hijacking attack?

A. Evil twin

2. Which of these is connected to the users' wired infrastructure without their knowledge?

A. Rogue AP

3. Which of these is the process of adopting another system's MAC address for the purpose of receiving the data meant for that system?

A. ARP spoofing

4. Which of the following types of attacks includes double tagging?

A. VLAN hopping

5. Which of these was previously known as the man-in-the-middle attack?

A. On-path

6.  In which of these do the attacker and his bots send a small spoofed 8-byte UDP packet to the vulnerable NTP servers that request a large amount of data to be sent to the DDoS's target IP address?

A. NTP

7.  Which of these is an attack that inundates the receiving machine with lots of packets that cause the victim to waste resources by holding connections open?

A. SYN flood

8. Which of these is a version of the DoS attack that floods its victim with spoofed broadcast ping messages?

A. Smurf

9. Which of the following attacks includes the command and control server?

A. DDoS

10. Which of the following is not a technology-based attack?

A. Shoulder surfing

 

QUIZ-18

1. Where should the users always start their search for driver updates?

A. Website of the manufacturer

2. Which of the following conditions should be included when configuring ACLs between the Internet and the private network to mitigate security problems?

A. Deny any addresses from the internal networks.

3. In which of the following systems are users organized by job into security groups, which are then granted the rights and permissions required to perform that job?

A. RBAC

4. Which of these is also called whitelisting?

A. Implicit deny

5. Which of the following statements is true about the explicit deny approach?

A. All traffic is allowed unless it is especially denied with a rule

6. Which of these can be used with a wireless sniffer?

A. MAC address filter

7. Which of these creates two WLANs in one?

A. Guest network isolation

8. Which of these defines the area in which an operation can be performed by using a GPS?

A. Geofencing

9. Which of these is a web page to which the users are directed when they attempt to connect to the WLAN?

A. Captive portal

10. Which of these is a role that an IoT device can play in a botnet?

A. Zombie

 

QUIZ-19

1. Which of the following types of VPN includes a split tunnel and a full tunnel?

A. Client-to-site

2. Which of these is not an example of a remote desktop connection?

A. SSH

3.  Which of these operates similar to Telnet, except instead of getting a command-line prompt as the users do with Telnet, they get the actual GUI of the remote computer?

A. RDP

4. Which of these was formerly called Terminal Services Client?

A. Remote Desktop Connection

5. Which of these allows the users to tunnel directly to the remote server with no VPN?

A. RDP Gateway

6. Which of these is a network protocol that is designed as an alternative to command-based utilities, such as Telnet?

A. SSH

7. Which of the following is not a component of VNC?

A. VNC desktop

8. Which of these is an operating system image delivered over the network at each startup?

A. Virtual desktop

9. Which of the following is provisioned for the most effective way to control both authentication of remote users and the application of their permissions?

A. AAA

10. Which of the following technologies includes Integrated Lights-Out?

A. Out-of-band management

 

QUIZ-20

1. Which of these includes an open case warning?

A. Tamper detection

2. Which motion detection system operates by emitting a magnetic field and monitoring that field?

A. Capacitance

3. Which motion detection system operates by identifying changes in heat waves in an area?

A. Infrared

4. Which of these is managed using a simple desktop or mobile software?

A. Smart locker

5. Which of these was previously known as mantrap?

A. Access control vestibule

6. Which of these occurs when a legitimate user is denied authentication in a biometric system?

A. False negative

7. Which of these are not examples of multifactor authentication?

A. USB fob and smart card

8. Which of these comprises a category of devices that are used to identify and authenticate users?

A. Access control hardware

9. Which of these is designed to operate using characteristic and behavioral factors?

A. Biometric system

10. Which of the following would not be considered a detection method?

A. Employee training

 QUIZ 21

1)At which layer do the servers connect on a three-tiered network?

A) Access

2) Which of these is used to describe network traffic flow that either enters or leaves the data center from/to a system physically residing outside the data center?

A) North-South

3) Which of these allows for applications to control and configure the network without human intervention?

A) API

4) Where does the SDN controller interface reside in the control plane with the switching fabric?

A) Control plane

5) Which of these is a process-related standard that outlines best practices for IT asset management in an organization?

A) 19770-1

6) You have upgraded the firmware on your switches and access points. Which documentation do you need to update?

A) Physical network diagram

7) UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?

A) White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

8) Which pins are switched in a crossover cable?

A) 1 and 3, 2 and 6

9) Which of these governs how a network is configured and operated as well as how people are expected to behave on a network?

A) Policies

10) Which virtualization approach runs within a conventional operating system environment?

A) Type 2 hypervisor

11) Which of these describes numerous technologies that are able to deliver voice communications over the Internet or other data networks?

A) VoIP

12) Which of these are the reasons to optimize network performance?

A) Minimizing latency

Using VoIP

Using video applications

13) Which of these methods are used to connect a private cloud to a public cloud?

A) Internet

VPN

Direct Connect

14) Public clouds are divided into logical groupings that allow many different customers to access a section as if it were their own private data center. This process is known as ___________________.

A) multitenancy

15) When the vendor provides the hardware platform or data center, and the company installs and manages its own operating systems and application systems, which service type is being used?

A) Infrastructure as a Service

16) After a network configuration change has been made, which of these is not a document that needs to be updated?

A) Application document

17) While unexpected adverse effects of a change can't always be anticipated, a good-faith effort should be made to identify all possible systems that could be impacted by the change.

A) True

18) Abstracting the cloud hardware into software objects for automated configuration is referred to as ___________________.

A) Infrastructure as Code

19) Which of these is included in the rack security?

A) Swing handle with a number and a key lock

20) Which of the following components of virtual networking can perform all the same functions as physical servers?

A) Virtual server

 

QUIZ 22

1) Which device components should not be allowed to reach full capacity?

A) Memory

CPU

2) Which of the following statements is true about latency?

A) More the latency, longer the delay, and longer the users have to stare blankly back at their computer screen, hoping something happens soon

3) What is the variation in delay called?

A) Jitter

4) Which SNMP version added support for the GET BULK operations?

A) SNMPv2c

5) Which of these supports strong authentication with MD5 or SHA, providing confidentiality and data integrity of messages via DES or DES-256 encryption between agents and managers?

A) SNMPv3

6) Which of the following versions of SNMP supports plaintext authentication with community strings and uses only UDP?

A) SNMPv1

7) Which networking protocol uses OIDs and MIBs for data collection and organization of data?

A) SNMP

8) Which of these is a text string containing detailed information about the event being reported?

A) Description

9) Which protocol allows the users to display, sort, and even search messages, all of which makes it a great troubleshooting tool?

A) Syslog

10) Which of the following Syslog severity level denotes that the system is unusable?

A) Emergency

11) Which of these represents the bi-directional traffic flow across an Ethernet interface?

A) Full-duplex

12) Which of these mathematically determines network errors?

A) CRC

13) Which environmental variables are critical factors in the health of computing equipment?

A) Temperature

Humidity

14) Which of these occurs when a segment of data fails the addition or deletion of header information?

A) Encapsulation error

15) What can be the smallest size of an Ethernet frame?

A) 64 bytes

16) A specific server's baseline describes norms for factors, such as how busy its processors are and how much of the memory it uses.

A) True

17) Which of these can refer to the standard level of performance of a certain device or to the normal operating capacity for the whole network?

A) Baseline

18) Which of these can collect more granular information on traffic flows than SNMP is able to?

A) NetFlow

19) Which of these is a system-design protocol that guarantees a certain amount of operational uptime during a given period?

A) High availability

20) Which of these are the metrics that are tracked to account for utilization in operations?

A) Uptime

Downtime

 

QUIZ 23

1) You install new switches in your server room and are now experiencing network instability and other issues across all servers in the rack. Which device would be used to alert you of system overheating?

A) Voltage event recorder

2) Which of the following tools can test a port on a device?

A) Loopback plug

3) Which device monitors incoming voltage levels and overvoltage thresholds?

A) Surge protector

4) On which of these would a technician use a punch-down tool?

A) 110 blocks

5) Which tool is used to attach an RJ-45 connector to Cat 5e, 6, 7, or 8 cables?

A) Crimper

6) Which tool pushes a conductor between the sides of a V inside an IDC?

A) Punch-down tool

7) Which device will be used to locate a specific connection in an unlabeled punch-down block?

A) Toner probe

8) Which device would be used to measure voltage?

A) Multimeter

9) Which of these is not a function of a TDR?

A) Display unused services.

10) Which software tool looks at all traffic on a network segment?

A) Packet sniffer

11) Which device should be used if you need to determine whether your network meets ISO or TIA standards?

A) Certifiers

12) Which of these can check the speed and condition of the signal on a cable, measure the time it takes to send a signal down the wire and back, and find the exact location of a break?

A) TDR

13) What is the purpose of wire-map testers?

A) To detect transposed wires, opens, and shorts in twisted-pair cables

14) Which of the following statements is true about a butt set?

A) It is essentially a portable telephone that allows the users to test analog wet or dry lines and is used to monitor those lines.

15) End-to-end loss across an Ethernet cable is called _______.

A) attenuation

16) You need to create a cable that will connect your host to a wall jack connection. Which of the following tools will you use?

A) Snips

17) Which tool would the users use to both find a break in a fiber-optic connection and test the fiber connectivity on the network?

A) OTDR

18) Which tool will the users use to trace cables in multiple-pair wiring?

A) Toner probe

19) Which of the following statements is true about a wire-map tester?

A) It is a device that transmits signals through each wire in a copper twisted-pair cable to determine if it's connected to the correct pin at the other end.

20) Which of these is a wiring error where two connections that are supposed to be connected using the two wires of a twisted-pair cable are instead connected using two wires from different pairs?

A) Split pair

 

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh