Skip to main content

IS-5203 week-8 FinalQuizs

 

1. Which of the following technologies is designed for communication over long distances on networks containing thousands or millions of users, requiring

complex and expensive infrastructure?

 

WAN

 

 

2. A user has performed multiple JSON and XML edits. Which of the following layers of the OSI model relates to the given operation?

 

Presentation

 

 

3.  Which of the following protocols is not included in the network layer of the OSI model?

 

SPX

 

 

4.According to the OSI model, which of the following layer devices include more complex switches and routers?

 

Layer 3

 

 

5. Which layer of the OSI model performs the process-to-process communication using segments?

 

Transport

 

6. Which of the following layers of the OSI model provides delivery and formatting of information for processing and display?

 

 

Presentation

 

 

 

7. Which of these are the types of PDUs?

Set

Trap

Get

 

8. Which layer 1 technology allows a single primary rate interface to deliver multiple voice calls simultaneously?

 

 

TDM

 

 

Which of the following statements is true about TDM?

 

A) The muxer and demuxer must be firmly synchronized.

 

 

10. Depending on the transmission rate, what is the effective range of multimode fibers?

 

A) 500-2000 m

 

 

11. The simplest way of signaling is by encoding it into a single binary signal and transmitting it along a wire or fiber optic cable.

 

A) True

 

 

12.  Which type of connector is one of the first popular MMF connectors and is increasingly being replaced by SFF connectors?

 

A) ST

 

 

13. Which of the following statements is true about the twist rates in twisted-

pair cables?

 

 

A) Higher twist rates are more resistant to crosstalk but need a little more wire for a cable of the same length.

 

 

14. Which of the following statements is true about insertion loss?

 

A) 0 dB would indicate a perfect and a lossless connection.

 

 

15. Jennifer, a network administrator, is troubleshooting an expansion card in a computer that allows the computer to receive faxes over a VoIP line. Which of the following cable types is used to connect the line to the expansion card?

 

A) CAT6

 

 

16. Which of the following types of cables don't need EMI shielding?

 

A) Optical

 

 

17. Ann, a network technician, is replacing the existing cables in her company's remote location. She has to re-install a new cabling solution that will have 10 Gbps speed and can also be run between the structural and drop-down ceilings providing safety in case of fires. Which of these will best meet the requirement of Ann?

 

A) Plenum, Cat 6a

 

 

18. A company's management has given a list of requirements to the network technician for a LAN connection using CAT6 cabling in an older building. The technician has to keep the environmental factors in mind during the network installation. Which of these should the network technician consider while deciding whether or not to use plenum-rated cables?

 

A) Ceiling airflow condition

 

 

19. Which of the following statements is true about a quick termination connector?

 

It is a connector with a factory-polished ferrule already containing a fiber stub.

 

 

20. The users in a company have reported intermittent connectivity issues. When the network technician asked the users to detail the issue, they said the issue is frequent, happens anytime, and the cause is unknown. While troubleshooting, the network technician discovered that the Ethernet cable was running parallel to the electric cable. What can be the cause of the issue mentioned in the given scenario?

 

A) EMI

 

 

21. Which of these is the correct name of the original Ethernet standard?

 

A) 10BASE5 

 

 

22. Which of the following IEEE 802.3 standards supports up to 30 workstations on a single segment?

 

A) 10Base2

 

 

23. The end goal of network security is minimizing the risk to critical assets. However, to calculate risk, the users need to know what threats they face and where the network is vulnerable.

 

A) True


 

24.Which of the following statements is true about a learning bridge?


A)It can use the network’s traffic to teach itself the location of any given address.


 

25.A network technician in a company has to assist a security team that wants to capture all traffic on a single subnet between the router and the core switch. The team has to ensure that there is only a single collision and a broadcast domain between the router and the switch to collect the traffic easily. Which of the following devices should the technician install to meet the goal mentioned in the given scenario?


A)Hub


 

26.The internal DNS servers contain the complete list of records but respond only to requests from clients inside the network.

 

A)True


 

27.Which of the following two needs are balanced using the DNS resolution process?


A)Minimizing DNS traffic volume and the time needed to update records


 

28.Services, such as DNS and DHCP, rely on the rapid exchange of small amounts of data rather than extended conversations.


A)True


 

29.Repeaters are used to extend the range of wireless networks.


A)True


 

30.Your company has two mail servers responsible for sending, receiving, and managing emails. Which of the following network protocols will you use to transfer emails between mail servers?


A)SMTP


 

31.Which protocol uses UDP port 123 and allows hosts to get information from a time source either by direct queries or by listening to broadcast or multicast traffic?


A)NTP


32.TCP’s data unit is called a router.

 

A)False


 

33.Which of the following fields in the IPv4 packet specifies the current hop limit?

A)TTL


 

34.Which of the following statements are true about SSH?

A)It is an encrypted replacement for telnet and FTP.
It uses TCP port 22.


 

35.Multiple lower bit rate streams are combined by a device called a multiplexer.


A)True


 

36.If the binary values are of 8-bits, the users show the full eight digits even if it starts with 0.

A)
True



37.Multicast addressing enables multiple recipients to receive messages without flooding the messages to all hosts on a broadcast domain.


A)True


 

38.Which of the following statements is true about the unique local addresses?

 

A)They were designed to replace site-local addresses, so they allow communication throughout a site while being routable to multiple local networks.


 

39.To create subnetworks, the users take bits from the host portion of the IP address and reserve them to define the subnet address.

A)True


 

40.Which of the following system ports is sometimes called the registered port?

A)User


 

41.Static routing does not scale well in large networks, but dynamic routing does. Why is it so?

 

A)Because network routes are automatically added to the routing table via the routing protocol


 

42.Which of the following are not considered link-state routing protocols?

A)RIP
RIPv2and


 

43. Markus, a network analyst, wants to create broadcast domains to eliminate the need for expensive routers. Which of these will help him to accomplish the task?


A)VLANand


 

44. How many broadcast domains are created when an unmanaged 12-port switch is used?

A)1and


 

45. Jane, a user on a company's network, is not able to access the shared printer and other resources. However, she can reach the Internet. Other users are not having any such problem. What can be the cause of the issue mentioned in the given scenario?

A)Incorrect VLAN assignment


 

46.Which of the following security features is designed to prevent DoS and reconnaissance attacks, which utilize the control plane of software-defined networks?


A)CoPPand


47. On Wi-Fi networks, both WEP and WPA-TKIP use the RC4 cipher, but WEP’s implementation is far more vulnerable to attack.

A)True



48.Which type of cryptographic technology can be used for authentication and non-repudiation?

 

A)Asymmetric


 

49.Your wireless network is configured with WEP encryption and has a limited number of users. You notice that there are some unauthorized connections on your access point. Which of the following steps will you take to enhance the security of your network?


A)Configure WPA encryption.
Configure MAC filtering.


50.Which of the following SNMP versions has no significant security features, and the devices only respond to messages containing the correct community name string?


A)SNMPv1


51.Syslog uses a relatively simple client-server model.

A)True


52.Which of the following disasters is not included in the accidents and disasters category during threat assessment?

A)Equipment failure


 

53. Which of the following methods are available for hardening network devices?

A)Disable unnecessary services to prevent their compromise.
Apply all firmware security updates.
Disable unnecessary switch ports and network interfaces to prevent unauthorized connections.


 

54.A network technician has configured a VLAN for the Sales and Accounts department of a company. The users of each department are located on different floors of the office. The network technician decides to educate the users regarding the VLAN configuration. Which of these will help the network technician to easily make the users understand the VLAN configuration?


A)Physical network diagram


 

55.Which of the following statements is true about fire suppression?


A)Class A (flammable solids), Class B (flammable liquids), and Class D (combustible metal) extinguishers should only be placed or used near fire hazards of their appropriate types.


 

56.During lengthy outages, a UPS is an ideal way to prevent interruption while the users turn on the generator.

A)True


 

57.Which of the following statements is true about non-repudiation?

A)The authenticity is verified in a way that even its creator can’t dispute.

 


58)
How is the core of information security commonly summed up?

A)By the CIA triad


59.While securing the applications, the users must establish policies for acceptable and unacceptable applications on network hosts.

A)True


 

60.Which of the following statements is true regarding the process of restricting permissions using the principle of least privilege?

A)Use extra auditing for privileged accounts, such as administrators.


61.A company is concerned about the possible attacks on its network by the attackers to gain access to confidential research data. Which of these is a type of vulnerable system that could be implemented to redirect any attackers on the network?

 

A)Honeypot


 

62.Networks commonly apply cryptographic protections where an attack is most likely to occur, for authentication processes, for particular types of traffic, or specific physical network segments.

A)
Trueand

63. 
A company provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which authentication protocol should be used to accomplish the goal mentioned in the given scenario?

A)
EAPand


64. Smith, a network administrator, is hardening an authentication server. One of the primary requirements is to manage access control to several services by using one centralized authentication server. Which of the following technologies should Smith configure?

A)Kerberos


65.Authorization is vital, especially against insider attacks, and as long as any access is associated with a specific user, that user can be assigned specific permissions.


A)True


66. In which of the following types of assessments do the users need to consider security risks through the supply chain?

A)Vendor


 

67. Agentless SIEM relies on packet captures or remote access protocols, such as SNMP and Syslog.

 

A)Trueand


 

68. Which type of attack works well against the word-based or name-based passwords many users choose for ease of memory?

 

A)Dictionary


 

69.The terms virus and worm are often used interchangeably and are therefore easily confused. How are they differentiated?

 

A)On the basis of how they are spread


 

70.Which of these are considered social engineering attacks?

 

A)Phishing
Piggybackingand
 
Shoulder surfing

 

71.Jennifer, a network analyst, has been tasked to limit the users that can connect to a network printer located centrally within an office environment. Which of the following tools will Jennifer use to complete this task?


A)ACL


72.Which of these was the most common reason for BSOD errors and system reboots in the older versions of Windows?


A)Failure of the graphics driver


 

73.Which of the following terms examines the packet origins at a network's periphery to restrict the outside traffic?

 

A)Edge control


 

74.Which of the following statements is true about biometrics?

 

A)Inherence elements that are based on personal physical characteristics are called biometrics.


75.Joey, a security analyst, is tasked to implement multi-factor authentication in a company. On the basis of the authentication factors, which of the following are the best implementations that he should deploy?


A)Biometrics, smart cards, and strong passwords


76.Why a password written on a slip of paper is a knowledge factor?

 

 

A)Because it’s meant to be remembered


77.Which of the following statements is true with regards to securing

authentication and identity management?

 

 

A)Ensure that network-based authentication uses secure protocols.


 

78.Which of the following is not an example of using network segmentation to control traffic through the internal network?

 

A)Enable DHCP snooping, dynamic ARP inspection, and (for IPv6) RA guard.



79.Which of the following incident goals ensures that incident prevention and


 

A)response follow the organization’s policies plus any relevant laws, business agreements, or generally expected industry practices?

 

A)Regulatory compliance


80.Which of these is not a symmetric algorithm?

 

A)MD5and


81. 
Which of these is a proprietary protocol used by Cisco routers?

 

 

A)NetFlowand


 

82. A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following pin mappings represent what the technician should do to make a crossover cable before crimping the new plug?

 

 

A)1 > 3, 2 > 6, 3 > 1, and 6 > 2


83.A technician is troubleshooting a point-to-point fiber-optic connection at a remote site of a company that has no connectivity to the main site. The technician verifies that the switch and the send-and-receive light levels are within an acceptable range. Also, both fiber SFPs are confirmed as working. Which of these should the technician use to reveal the location of the fault?

 

 

A)OTDRand


84. Which of the following vulnerability scanning tools is also known as a sniffer?


A)Protocol analyser


85.A network technician is receiving complaints from the management board that they are unable to do meetings from the conference room. The network is too slow, and there are frequent disconnections. The network technician finds that the conference room and cafeteria are located on either side of a single hallway where there is only one access point. He also observers that there is a large number of people in the cafeteria. Which of these best describes the cause of the issue mentioned in the given scenario?

 

 

A)Overcapacity


 

86.The chief information officer has noticed that the corporate wireless signal is available in the parking lot. Now, the management requests the network administrator to change the wireless network so that it is no longer accessible in public areas without affecting the availability inside the building. Which of these should the network administrator change on the wireless network?

 

A)Power levels


87.A network technician is troubleshooting a wireless connectivity issue in a small building where the tenants access multiple wireless networks. The users report intermittent connectivity. Which of the following is the most likely cause of the problem?


A)Channel overlap


 

88.A network technician has recently installed a new wireless access point on the company's wireless network. All the settings for the new access point were copied from the baseline. Due to this change, the network technician is getting reports from the sales department that they are having irregular wireless connectivity, while other departments are having no such problem. What can be the possible cause of the issue mentioned in the given scenario?

 

 

A)Incorrect AP placement


 

89.If there is a difference of 1 dB between two signals, then what will be its ratio?

 

 

A)1.26and


 

90. In a NetFlow system, what are the devices that identify network flows called?

 

 

A)Flow exporters


 

91.Adam, a user, reports to you that he is unable to communicate with a particular IP address on the company's network. You have addressed the issue and, now, you need to find where the traffic is stopping. Which of the following commands will you use?


 

A)tracertand


 

92. Which of these is used when a host joins a network or is assigned a new MAC address?

 

 

A)ARP announcement


 

93.Roy, a network administrator, needs to delete the DNS cache and the current cache that has incorrect entries. Which of the following parameters will he use?


 

A)/flushdns


 

94.Consider the following command:


 

A)The users can use these options to change the command’s functions.



 

 

 Which of the following statements is true about authentication in a client-server fashion?

 

The server hosting resources ask for credentials, and the client provides them.

 

Which of the following networks connects multiple LANs using long-range transmission media?

 

WAN

 

James, a network engineer, is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following networks will James implement?

 

MAN

 

Ethernet is not only the standard used for almost all modern wired LANs, it’s also increasingly being used for telecommunications and storage networks and is even increasingly adopted as a WAN technology.

 

True

 

Which of the following technologies is used to connect private devices?

 

PAN

 

Which of the following standards are used within the telecommunication networks?

 

MPLS

Frame Relay

 

 

Internet is an example of the largest WAN.

 

True

 

A LAN could have hundreds or thousands of nodes.

 

True

 

SDWAN is a virtual WAN architecture that uses software to manage connectivity, devices, and services and can make changes in the network that is based on the current operations.

 

True

 

A WAN operates using leased lines from a telecommunication provider, connecting to the LANs in each site.

 

True

 

Which of the following statements are true about networks?

 

In a logical network, connections are the protocols that guide data to its destination address.

 

Radio signals are part of the physical network.

 

Which of these is a primary concern for WANs?

 

Security

 

 

Which type of network scope is often used to connect all or parts of a city?

 

MAN

 

 

Which of the following statements are true about a logical network?

It is the information carried by the physical network.

It is the network from the perspective of the computers that use it.

It is the path that the information follows.

 

Which of these implies a line topology with reference to the point-to-point connections?

Bus

 

An effective network’s topology is a matter of planning, not organic growth.

True

 

Essential WAN technologies include user-level connections, such as cable, DSL, or 4G.

True

 

Which of these is a standardized rule for formatting data?

Protocol

 

Tasks, such as data compression, decompression, encryption, and decryption, are all associated with the presentation layer of the OSI model.

True

 

Which of the following statements is correct about sessions in the session layer of the OSI model?

They must be created, maintained separately from other sessions, and ended.

 

Which of the following statements are not true about the OSI model?

It describes network communication in terms of the underlying network technology or structure.

It is a suite of protocols that serves as the world's primary network standard.

 

Which of the following statements is true about the data link layer of the OSI model?

It is subdivided into two sublayers, namely, MAC and LLC.

 

Which of the following statements is correct about the OSI model in networking?

It is made up of seven layers arranged vertically in what is called a stack.

A communication protocol or network appliance can be described by the layer it occupies.

 

The transport layer of the OSI model translates the data between network packets and also the data used by applications.

True

 

The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.

True

 

Which of the following statements is true about the twisted-pair cables?

Each balanced pair is warped around itself for the cable’s length, so even a nearby source, such as a parallel cable, will, on average, balance out.

 

APC connectors can be used only with other APC connectors.

True

 

Which type of cable uses low-smoke and fire-retardant materials?

Plenum

 

 

Ethernet addressing uses the MAC address burned into each and every Ethernet NIC.

True

 

Which of these are the common representations of binary values?

Hexadecimal

Octal

 

What is the correct distance range of 1000BaseLX?

From 3 km up to 10 km

 

Which of the following actions are taken by a learning bridge when it checks the destination address against its MAC table?

If the destination is on the same segment as the source, it filters the frame by ignoring it.

If the destination is in the table and on a different segment from that source, it forwards the frame to only that segment.

If the destination address isn’t in the table, it floods the frame to all other segments except the source.

 

 

A network technician has to perform maintenance on many of the company's web servers during a scheduled change window. This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?

Load balancer

 

Which of these is not considered a network device?

Media

 

Which DNS record is an IPv6 address record that maps a hostname to an IPv6 address?

AAAA

 

 

Which of the following statements is true about the networking concepts?

A repeater is a node on the physical network.

 

Which of these best describes network reliability?

Minimal transmission errors, and detection and correction of any that do occur

 

The MIB is a database with a set of predefined questions that the NMS can ask the agents regarding the health of the device or network.

True 

 

Why is the TCP/IP model in such wide use, despite its limitations?

 

It proved so robust and scalable that it was quickly adopted by the US government and research networks that formed the early Internet.

 

 

 

Which of the following statements is correct about SMB?

 

It allows folders or hard drives to be shared over the network and accessed as if they were local drives.

 

 

 

Which of the following are the resource-sharing protocols?

LDAP

SMB

 

 

 

What is the port number of SMB?

TCP 445

 

Which of the following IP addresses is reserved for private use?

10.100.200.0

 

 

 

Which of the following would be the most efficient subnet mask for a subnetwork accommodating eight hosts?

/28

 

 

A network technician in a company has to create a subnet for 500 host machines. The technician is instructed to use a class B address scheme and leave possible rooms for additional subnets of the same size. Which of the following addresses would fulfill these requirements?

 

172.18.0.0/23

 

 

A technician is troubleshooting a customer's network connectivity issue. He needs to determine the IP address of the customer's router. The customer has an IP address of 192.168.1.55/24. Which of these is the address of the customer's router?

 

192.168.1.1

 

 

 

 

 

 

 

 

A company is setting up a new branch office. The new office will have two departments, Finance and Engineering. The Finance department will have 55 employees and the Engineering department will have 5 employees. The IP subscribed from the ISP is 192.168.1.0/29. The network administrator is configuring the subnets for the two departments starting with the Finance department. What will be the last host address on the Engineering subnet?

 

 

192.168.1.78

 

 

A network technician has to set up a firewall on a company's network that would assign private IP addresses to users inside the network and show a public IP address out to the Internet. Which of these should the network technician use to achieve this goal?

 

NAT

 

 

The original intention of NAT was to slow the depletion of available IP address space by allowing many private IP addresses to be represented by some smaller number of public IP addresses.

 

True

 

 

Why is a routing table more complicated than a MAC table on a switch?

 

Because each entry has to have more pieces of information

 

 

 

Both RIPv1 and RIPv2 are distance-vector protocols, which means that each router running RIP sends its complete routing tables out to all active interfaces at periodic time intervals.

 

True

 

 

 

Which of the following statements is true about RIP?

 

Since it has a maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable.

 

 

 

Which of these is not a distinct function of the layer 2 switches?

 

Easy maintenance

 

 

 

 

Which of the following statements is true regarding network convergence?

 

High-performance TCP/IP networks augmented by additional technologies are increasingly displacing other options.

 

 

 

Which of the cellular technologies is a type of cell phone that contains a SIM chip?

 

GSM 

 

 

An ad hoc network would not scale well and is not recommended due to collision and organization issues.

 

True

 

 

What should you do if you cannot connect to an AP and you've verified that your DHCP configuration and WEP key are correct?

 

Check the MAC address filtering on the AP.

 

 

 

Which of the following statements is true about the input errors?

 

They often indicate high-level errors, such as CRCs.

 

 

Which of these is not a category of the cause of disaster in a disaster recovery plan?

 

Technical

 

 

Which of the following protocols allows active-active load balancing?

 

GLBP

 

 

Which of the following statements is true about the dial-up access?

Some ISPs offer dial-up access to users who subscribe to other services.

 

 

 

An attacker floods a switch with frames in an attempt to redirect traffic to his server. Which of the following attacks is the attacker most likely using?

 

ARP spoofing  

 

 

 

An attacker, after gaining access to a facility, places a wireless access point to make it look as though it belongs to the network. He then begins eavesdropping on the wireless traffic. Which of the following attacks has the attacker performed?

 

Evil twin

 

A hospital has installed CCTVs on all the entrances and hallways to monitor the people entering and leaving the facility. The camera feeds go to the surveillance room where security personnel monitors the activities. One of the security personnel notices a man wearing a doctor's lab coat whose identity cannot be verified by looking through the video feed. The man is seen interacting and mobilizing with other people around him. What kind of attack is the security personnel witnessing?

 

Social engineering

Which of the following statements is true about RBAC?

 

It is commonly used in networks to simplify the process of assigning new users the permission required to perform a job role.

 

 

A network technician configured a network device. After restarting, the device was unresponsive. Even after doing a hard reset, the device was not restored to factory defaults and did not display any output. Which of these has the technician most likely performed?

 

Firmware update

 

 

A company wants to secure its WLAN network by implementing a method that will provide a web page before the users ask for authentication credentials while allowing them access to the network. Which of these will help in satisfying this requirement?

 

Captive portal

 

The most effective way to control both authentication of remote users and the application of their permissions is to provision an AAA server.

 

True

 

 

 

 

 

A network administrator has to implement a physical security control method that can prevent an attacker from gaining access to a network closet or server room. Which of these will help the network administrator in achieving this goal?

 

Mantrap

 

Which of the following combinations will form a two-factor authentication process?

 

Smart card and PIN

 

 

Which of the following statements is true about access control hardware? 

 

It comprises a category of devices that are used to identify and authenticate users.

 

 

Which of these is a technique that writes data patterns over the entire media, thereby eliminating any trace data?

 

Overwriting

 

Which of the following services provides the desktop and other resources?

 

DaaS

 

QoS refers to the way the resources are controlled so that the quality of service is maintained.

 

True

Which of these are installed in racks, such as servers, firewall appliances, and redundant power supplies?

 

System labeling

 

A network administrator is setting up a web-based application that needs to be continually accessible to the end-users. Which of the following concepts would best ensure this requirement?

 

High availability

 

 

High memory utilization can be as severe as a saturated CPU.

 

True

 

Decibels can be used to describe the absolute power level of a signal that’s being sent or received or the relative losses due to the transmission medium.

 

True

 

 

Loopback adapters are only useful to verify that the port transmits and receives electronics successfully.

 

True

 

 

 

A laser transmission would stay in a tight beam and only suffer attenuation due to absorption by the air.

 

True

 

 

Which of the following statements is true about SNR?

 

The higher the SNR, the lower the noise floor with respect to the signal.

 

 

 

Members of a basic service set share a 48-bit identifier compatible with the MAC standard and included in every Wi-Fi frame sent by its members. What is this identifier called?

 

BSSID

 

 

Which of these are some of the calamities that the users should escalate while implementing the solution during network troubleshooting?

 

Routing loops

Routing problems

Broadcast storms

 

 

 

Which of the following is not the step for testing a theory when troubleshooting?

 

Measure the plausibility of the theory against the most obvious cause of the problem.

 

 

 

 

On the network, you don’t just need to know what the matter is, but you need to know how many users are affected. Which of the following steps of problem identification is explained in the given information?

 

Identify the symptoms.

 

Which of these describes the resolution of a problem while troubleshooting the network?

 

Planning and implementing a fix for the problem

 

Which of these is not a general guideline for establishing the probable cause of a network problem?

 

Consider only the most relevant approach.

 

While troubleshooting a network, it's important to view the identification of a problem as an ongoing process.

 

True

 

 

The important troubleshooting process for Network+ is CompTIA's five-step model.

 

False

 

 

 

 

Which of the following procedures are employed when identifying a network problem?

 

Determine if anything has changed.

Question users.

Approach multiple problems individually.

 

 

Which of the following statements are true about network troubleshooting?

The users can solve a surprising amount of problems by fiddling with one piece of a system after another until things work.

The important thing is that the specific methods find a complete process and stick to it, especially during the diagnosis process.

Using a systematic process will give the users quicker and more consistent results.

 

 

Which TCP/IP tool supersedes the ifconfig, arp, and route commands?

 

ip 

 

Which of the following TCP/IP tools tests the reachability and latency of a given host?

 

Ping

 

 

 

 

Which of the following TCP/IP tools is a more powerful alternative to nslookup for performing DNS lookups?

 

dig

 Which of these is a general category of scope for a network used over great distances?

 

WAN

 

Which specific type of network configuration is often used in the case of a single institution consisting of multiple and collocated buildings?

 

CAN 

 

 

A junior network technician is configuring voice control of devices in the CEO's cabin. Which type of IoT network is established in the given scenario?

 

PAN

 

 

Which topology consists of two distinct and terminated ends, with each of its computers connecting to one unbroken cable running its entire length?

 

Bus

 

 

A node on the logical network isn’t described by its physical location but rather by its address.

 

True

 

 

Which of the following leased line has a maximum data rate of 1.544 Mbps?

 

T1

 

NFV is the process of taking networking functions (such as routers, switches, firewalls, load balancers, and controllers) and virtualizing them.

 

True

 

The network layer of the OSI model is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the requested communication exist.

 

False

 

 

Which of these is not included in the layer 2 protocol of the OSI model?

 

IPv4 protocol

 

Which of the following statements are true about the presentation layer of the OSI model?

 

It controls the formatting and security of data.

It is sometimes called the syntax layer.

 

Which of the following layers of the OSI model translates physical layer bits to and from ordered packets called frames, transfers them between nodes, and optionally receives acknowledgment of their receipt?

 

Data link

 

 

 

Which of the following components is the transparent optical fiber that carries the signal and is made out of silica glass, which is far more transparent than ordinary consumer glass?

 

Core

 

 

Why is return loss a problem?

 

Because it causes interference

Because less signal reaches the receiver 

 

 

Some connections use intelligent demarc that performs signal translation or routing.

 

True

 

If an Ethernet segment needs to connect to another segment that uses Wi-Fi, Token Ring, or even a different Ethernet speed, a repeater can join them.

 

False 

 

Broadband is frequently used for referring to fast Internet connections instead of slow ones.

 

True

 

 

A narrowband transmission is highly susceptible to interference, either from noise sources or another network or electronic device using the same channel.

 

True

 

What is the wavelength of MMF?

 

Around 850 nm or 1300 nm

 

Which of the following devices should a network administrator configure on the outermost part of a network?

 

Firewall

 

Which of the following statements are correct about network connectivity?

 

The target system must be able to recognize and act on the data it receives.

There must be a physical connection between all points on the network.

Each system on the network must be able to transmit information to any other system with which it might want to communicate. 

 

Which of the following statements are true about load balancer configurations?

In the round-robin method, servers are listed in order, and each request goes to the server next in line.

The least-connection method is more complicated to implement than round-robin, but it’s better able to deal with services that have variable session lengths.

 

 

 

In which of the following methods, each incoming connection goes to the server with the fewest active connections?

 

Least connection

 

What is the purpose of a load balancer?

 

To deploy a hardware or software appliance designed to transparently combine distributed services into a single and virtual whole

 

What is the purpose of health checking in load balancing devices?

 

To track the functionality of each server in the load balancing pool and remove it in the case of a failure

 

Which of these is not a primary method of load-balancer configuration?

 

Priority weighting

 

Which of the following layer 1 devices connects multiple nodes into a star configuration?

 

Hub

 

Which of the following statements are true about a hub?

A hub has no memory for storing data.

It's similar to a repeater with more than two ports.

Connections to a hub are always effectively half-duplex.

 

 

Each connection to the hub is its own electrical connection but part of the same overall collision domain.

 

True

 

VoIP is used not only in voice chat apps but also in many phones.

 

True

 

Which of these are examples of IoT devices?

A smartphone app for your home thermostat

A remotely monitored cardiac pacemaker

A refrigerator with an internal camera

 

 

The simplest repeater has ports listening in two directions along a cable.

 

True

 

The users would use a bridge in a network to reduce collisions within broadcast domains and to increase the number of collision domains in their network.

 

True

 

 

 

 

 

 

 

Ann, a network technician, has set up an FTP server for a company to distribute software updates for the company's products. For security reasons, each customer is provided with a unique username and password. Several customers have discovered a virus in one of the security updates. The network technician tested all files before uploading them but on retesting the file, found the virus. Which of these should the network technician do for the customers to validate the proper security patch?

 

Provide an MD5 hash for each file.

 

Which of the following well-known ports do the users use to configure outgoing mail on a POP3 email client?

 

25

 

Layer 3 devices need a control protocol for sending diagnostic and error information relevant to layer 3.

 

True

 

The most common use for MySQL is for creating a manual database.

 

False

 

Which of these is a designation used in routing to send packets to a remote network?

 

Network address

 

 

 

 

Which of the following IP addresses is a local host that the router has already spotted via Ethernet traffic and added to the table?

 

192.168.100.24

 

In networks using IPv6 tunneling, an IPv6 packet can be carried as the payload of an IPv4 packet.

 

True

 

Which of these would be the most efficient subnet mask for a point-to-point link?

 

/30

 

 

Which of the following terms represents a higher layer router that uses NAT to split server requests between multiple identical servers?

 

Content switch

 

NAT is great to have around when an organization changes its ISP and the networking manager doesn't want the hassle of changing the internal address scheme.

 

True

 

Which of the following commands is used to view or alter the routing table?

 

Route

 

A network administrator has configured RIPv2 as the routing protocol for the company's network. Which metric will be in use for deciding the best path to the network?

 

Hop count

 

 

What happens when a switching loop floods the network repeatedly?

 

Broadcast storm

 

Which of the following statements is true about STP?

 

It is standardized as IEEE 802.1D.

 

STP is used by switches to communicate their relative positions and detect redundant links.

 

True

 

A properly designed VLAN-based network only routes a minority of traffic, while most packets remain within their VLAN.

 

True

 

Which of the following statements is true about VLANs?

 

They aren’t a single standard but rather a collection of method switches that can be used to partition broadcast domains.

 

 

You are installing an ADSL router for your company's new branch office. The router has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN named VLAN1. When you plug a laptop into one of the Ethernet ports, you can access the Internet with no difficulties. Now, you need to connect the ADSL router to the company's network so that the wireless access points on the network can provide the users with Internet access through the ADSL router. However, when you plug the router into a network switch port that is assigned to VLAN4, the switch starts generating 'Native VLAN mismatch detected' errors once every minute. Which of the following steps should be a part of the solution that you implement to stop the error messages from appearing?

 

Create a VLAN4 on the ADSL router's switch module.

Configure the router port connected to the network switch to use VLAN4.

 

Switches can create multiple broadcast domains by partitioning the network into the software. What are these domains called?

 

VLANs

 

All ports on the root switch are designated ports that forward the traffic they receive from their segment.

 

True

 

Which of the following technologies lets the switch bind multiple physical ports into a single logical interface?

 

Port aggregation

 

Which of the following statements is true regarding LACP?

 

It allows ports to be configured as active or passive.

Network taps and port mirrors should be placed on chokepoints for critical traffic.

 

True

 

What is the other name for the current 802.11ax Wi-Fi standard?

 

Wi-Fi 6

 

A network technician is setting up a wireless access point for a SOHO location. The user has demanded exclusive use of the 5GHz band. Which of the following wireless standards should the network technician use for the purpose mentioned in the given scenario?

 

802.11ac

 

Which of the following standards utilize MIMO on non-overlapping channels?

 

802.11ac

802.11n

 

Which of the following statements is true about the original 1997 802.11 standards?

 

It only supported network speeds of 2 Mbps.

 

Which wireless standard uses the 800-900 MHz ISM band with precise frequencies varying by country?

 

Z-wave

 

What is the primary purpose of SSID?

 

To allow devices to self-identify as members of a single interoperating logical network segment

 

A network technician is setting up a new wireless network. With the WPA2 standard in use, which of these will provide both data confidentiality and data integrity?

AES

CCMP

 

Which of these can be used to authenticate remote workers connecting from an offsite location?

 

RADIUS server

802.1X

 

 

Ad hoc networks are created peer to peer or directly between stations and not through an AP.

 

True

 

A high-latency network connection is one that experiences short delay times, while a low-latency connection suffers from long delays.

 

False

 

 

 

An organization's security policy requires that when new devices are introduced to the network, the devices must be monitored to establish normal traffic patterns. Which of these is generated from the initial monitoring of the devices?

 

Baseline

 

Which of the following are the functions of load balancing?

TCP offloading

Content caching

Priority queuing

 

Link aggregation can be used on routers or even hosts with multiple interfaces, where it’s more commonly known as NIC teaming.

 

True

 

Which of these makes clustering a less desirable option than load balancing?

It requires identical or nearly identical hardware for each node.

It doesn’t work as well for some services.

It can be more complicated to configure.

 

Which of the following spares is connected, powered on, and ready to serve as an automatic failover if the primary connection fails?

 

Hot 

 

 

 

 

 

A company recently faced an attack on its network infrastructure. On further inspection, it was found that the attacker exploited the vulnerabilities resulting from open switch ports. The CIO has instructed the network administrator that he not only wants the network to be secure but also would like to monitor any attack in the future. Which of these should the network administrator implement to achieve the goal mentioned in the given scenario?

 

Create a VLAN with honeypots.

 

 

A network technician has been given permission to exploit a weakness in the company's network. Which process is described in the given scenario?

 

Penetration testing

 

The attackers use the monlist command, which is a remote command in older versions of NTP, that sends the requester a list of the last 600 hosts who have connected to that server.

 

True 

 

A disgruntled employee performs a man-in-the-middle attack on a company's network. All the layer 2 traffic, which was destined for the default gateway, is redirected to the employee's network. What kind of attack has the employee performed?

 

ARP cache poisoning

 

 

 

 

A network administrator discovers multiple attempts to scan network hosts and devices originating from a single host on the network. Which of the following threats is most likely involved in the given scenario?

 

Compromised system

 

 

An organization has been facing an increased number of successful social engineering attacks. Which of these can help in reducing these attacks in the near future?

 

End-user awareness training

 

In an organization, many users are reporting that they are unable to access the Internet in the evening. Users working the day shift are not having such a problem. Which of these can be the cause of this issue?

 

 

Time-based ACL

 

A company has provided kiosks to employees within the organization's boundaries. However, some of the kiosks are in close proximity to a shopping center. The management is concerned about someone accessing the Internet via the kiosk's wireless network. The network technician has been asked to implement a solution that will provide wireless access only to the employees working at the kiosk. Which of these should the network technician implement?

 

Switch port security

 

 

 

 

Your supervisor has asked you to increase the security of the servers on your network. Which of the following procedures can be considered to be the server hardening techniques?

Disabling unnecessary services

Creating privileged user accounts

Disabling unused TCP and UDP ports

 

 

The inverse-square law applied to antenna placement dictates that if the distance from the antenna to the receiving device is doubled, then the signal will drop by how much?

 

6 dB

 

To ensure security, the users need to install new certificates or generate new SSH keys when deploying a device.

 

True

 

Ann, a network technician, has to implement a physical security control that will allow her to detect any intrusion into the server room. Which of the following physical security controls will be most suitable for the purpose mentioned in the given scenario?

 

CCTVs

 

 

 

 

 

 

Which of the following types of cameras are helpful in low-traffic areas, where full-time recording might waste network bandwidth or storage space?

 

Motion-sensitive

 

A company wants a cloud service solution that can provide a deployment platform for its applications, and it doesn't need to worry about the infrastructure requirements. Which of the following cloud services should be used for the purpose mentioned in the given scenario?

 

PaaS

 

A new employee is assigned a laptop by the network administrator, which was assigned to someone else in the company. Upon delivering the laptop to the new employee, the administrator documents the new location, the employee's name, and when the device was reassigned. Which of these best describes the actions mentioned in the given scenario?

 

Asset management

 

 

Which backup strategy contains the changes in data since the last full backup?

 

Differential

 

Which of these are the characteristics of jumbo frames?

MTU > 1500

Improves network performance

Used in SAN

 

Which of the following statements is true regarding the applications of heightened scrutiny to network applications?

 

Use secure alternatives to insecure protocols, such as HTTPS and SSH, instead of HTTP and Telnet.

 

Which of these frequently reports RSSI as a negative dBm measurement?

 

Wi-Fi analyzer 

 

Which of the following formulas can be used to express EIRP in decibels?

 

EIRP = ERP + 2.15

 

Which of the following approaches starts in the middle of the stack and can be quicker than the top-to-bottom and bottom-to-top approaches?

 

Divide-and-conquer

 

A network technician, while troubleshooting a Linux system, wants to display the associated IP address of a network adapter. Which of the following commands should he use?

 

Ifconfig

 

 

 

 

 

You are working at the IT help desk when a user calls to report that he cannot access the Internet, although he can connect to the computers on the local network. At the user's workstation, you run the ipconfig /all command and examine the output. Which of the following options is the most likely explanation for the user's problem, based on the given ipconfig results?

 

The 'Default Gateway' setting is incorrect.

 

Which of the following ping commands specifies the time stamp for count hops in IPv4 addresses only?

 

ping -s count

 

A user reports an issue to a network technician that he is unable to connect to the server. The user has Linux OS installed on his system. Which of the following commands should the network technician use to test the connectivity issue between two network devices?

 

ping

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Comments

Popular posts from this blog

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...