Networking + 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the functionality of multipathing? [Choose all that apply] Team two network adapters together Ensure a resource is highly available Create different network routes to a resource on the network Share the network traffic load for a server

Ensure a resource is highly available Create different network routes to a resource on the network

In which type of cloud configuration is the customer responsible for maintaining the operating system and software? Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Software as a Service (SaaS) Desktop as a Service (DaaS)

Infrastructure as a Service (IaaS)

Which IP address will be used to connect a resource after Network Load balancing has been configured? The individual hosts' IP addresses The DNS server's IP address The Cluster's IP address A DHCP assigned IP address

The Cluster's IP address

Which type of switch is best used for connections to web servers? a. Edge switch b. Core switch c. Spine switch d. Aggregation switch

a. Edge switch

With which network connection type does the VM obtain IP addressing information from its host? a. Isolation mode b. Bridged mode c. NAT mode d. Managed mode

c. NAT mode

Which type of switch connects all devices in a rack to the rest of the network? a. EoR switch b. Core switch c. ToR switch d. Spine switch

c. ToR switch

What is the key drawback of STP or per VLAN STP - PVST? Fast convergence Slow convergence Complicated configuration They do not have any drawbacks and are mostly used today They cannot provide loop free environment link RSTP or RPSTP

Slow convergence

The traffic that enters into a network is known as the ___________ traffic. Southbound Northbound East West

Southbound

Which STP bridge serves as the basis for all path calculations? a. Designated bridge b. Root bridge c. Spanning bridge d. Header bridge

b. Root bridge

Which cloud management technique executes a series of tasks in a workflow? a. Orchestration b. Automation c. IaC d. SLA

a. Orchestration

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. SDN (software-defined networking) b. Hypervisor c. Terminal emulation d. NFV (Network Functions Virtualization)

b. Hypervisor

When choosing the location to create resources in the cloud, what is the best location for the resources? [Choose all that apply] UK South UK West Closest Regional Cloud Service Provider Datacenter Geographically closest Cloud Service Provider Datacenter East US

Closest Regional Cloud Service Provider Datacenter Geographically closest Cloud Service Provider Datacenter

You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance? Spanning tree Jumbo frames Link aggregation Flow control Change the MTU to 1300

Jumbo frames

Which of the following is an example of Software as a Service (SaaS)? [Choose all that apply] SharePoint Server 2016 Microsoft 365 Microsoft Exchange 2019 Dropbox

Microsoft 365 Dropbox

When you set private IP address ranges for servers in your cloud, what service model are you using? a. DaaS b. IaaS c. SaaS d. PaaS

b. IaaS

Whale Telecommunications has hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per month cannot be more than 4 minutes and 22 seconds. Which of the following will you use in this scenario? Two 9s Five 9s Three 9s Four 9s

Four 9s

Which of the following are also known as content switches or application switches? ToR switches Layer 3 switches EoR switches Layer 4 switches

Layer 4 switches

Which tier in the three-tiered network is responsible for routing traffic in and out of a network? Distribution Core Edge Aggregation

x(Core) notes say distribution layer

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand? A root guard A BPDU guard A root bridge A BPDU filter

A BPDU filter

Which DNS record needs to be configured for a network load balancing cluster? MX record An A record CNAME record TXT record

An A record

How many tiers are there in the spine and leaf network architecture? 2 4 1 3

2

At which layer in Software Defined Network (SDN) will you find a firewall? Infrastructure Layer Application Layer Management Plane Layer Control Layer

Application Layer

Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices? Internet Small Computer Systems Interface (iSCSI) Fibre Channel over Ethernet (FCoE) Fibre Channel Arbitrated loop (FC-AL)

Internet Small Computer Systems Interface (iSCSI)

To ensure the high availability of a resource, what needs to be configured? NIC Teaming Multipathing Unicast Network Load balancing

Network Load balancing

You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports? MAC address filtering Port security Jumbo frames Port mirroring Flow control

Port security

With a _________ Cloud, the hardware and software are maintained by the company that owns it. Hybrid Public Community Private

Private

In which of the following cloud models is service provided over public transmission lines? Private cloud Hybrid cloud Community cloud Public cloud

Public cloud

Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands? Measured service Rapid elasticity Broad network access Resource pooling

Rapid elasticity

What is the advantage of elasticity when utilizing a cloud service provider? [Choose all that apply] Resources are deleted when not used Resources are deallocated when not used Resources are created automatically Resource allocation is scaled automatically

Resources are deallocated when not used Resource allocation is scaled automatically

Which of the following protocols keeps all potential paths active while managing the flow of data across the paths to prevent loops? CARP TRILL RSTP SPB

SPB

Which of the following layers will be used by an SDN controller to communicate with network applications using APIs (application programming interfaces)? The control plane The management plane The infrastructure plane The application plane

The application plane

Lifecare Insurance has plans to upgrade its enterprise grade network for better performance and to protect the network from problems whenever one or more network devices fail because of higher volumes of traffic. Rose is hired as a network administrator to oversee the change and to ensure that every device can function at its best without being swamped with too many kinds of tasks. After having a close look at the process, Rose is of the opinion that some of the devices are overburdened by heavy traffic, as a result of which they are unable to perform at full capacity. Analyze which step Rose should take to fix the issue at hand. Use top of rack switching to fix the issue. Try to fix the issue at the core layer of the three-tiered architecture. Use a SDN to distribute the traffic load. Use a load balancer to fix the issue.

Use a load balancer to fix the issue.

Which network architecture technique are you using when you run a virtual router on a network? a. NFV b. SAN c. STP d. SDN

a. NFV NFV (Network Functions Virtualization) is a network architecture that merges physical and virtual network devices. STP (Spanning Tree Protocol) is a switching protocol defined by the IEEE standard 802.1D that prevents traffic loops by artificially blocking the links that would complete a loop. A SAN (storage area network) is a distinct network of storage devices that communicate directly with each other and with other portions of the network. SDN (software-defined networking) is a centralized approach to networking that removes most of the decision-making power from network devices and instead handles that responsibility at a software level.

Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Speed b. Availability c. Bandwidth d. Fault tolerance

a. Speed

Which cloud characteristic ensures you can manage cloud resources from an iPad? a. Resource pooling b. Broad network access c. Multitenancy d. Rapid elasticity

b. Broad network access means client devices of all types can access services, applications, and storage in a cloud, no matter what operating system they run or where they are located, if they have an Internet connection

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Router b. Firewall c. Load balancer d. Switch

c. Load balancer

What information does the switchport port-security command use to restrict access to a switch's interface? a. IP address b. Broadcast address c. MAC address d. Port number

c. MAC address

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual load balancer b. Virtual firewall c. Virtual switch d. Virtual router

c. Virtual switch

Which SAN connection technology can run over ordinary Ethernet NICs without any special equipment needed? a. SATA b. FC c. iSCSI d. IB

c. iSCSI

When shopping for a new router, what does the MTBF tell you? a. How long it will usually take to repair that device b. How much it will cost to repair that device c. How long until that device fails d. How long devices like this one will last on average until the next failure

d. How long devices like this one will last on average until the next failure

You have been tasked with ensuring that the switches used in your organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you plan on enabling a MAC filtering function that will protect the Arista devices against MAC flooding. Which of the following commands will you use to bring your plan to action? port-security shutdown disable switchport port-security

switchport port-security

As a network administrator, you have to arrange a platform where the company's developers can load any kind of software on the servers, test it from afar, and share this content with distant members of the team. Which of the following will you use in this scenario? A SAN A CSP NFV SDN

A CSP

Which SDN plane moves traffic from switch port to switch port? a. Infrastructure plane b. Management plane c. Control plane d. Application plane

a. Infrastructure plane The infrastructure plane is made up of the physical or virtual devices that handle actual transmissions on the network, moving traffic from each port on a switch to other ports. The control plane handles the decision-making processes performed by network protocols. The application plane includes applications running on the network, such as DNS or VoIP. The management plane could be considered a part of the control plane and allows network administrators to remotely manage network devices, monitor those devices, and analyze data collected about the devices.

Which is longer for a reliable device? a. MTBF b. MTTR

a. MTBF This should be significantly longer than the MTTR (mean time to repair), which is the average amount of time required to repair a device once it fails.

You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode? configure terminal | voice vlan 10 | name VOICE configure terminal | vlan voice 10 | name VOICE configure terminal | vlan-voice 10 | name VOICE configure terminal | vlan 10 | name VOICE

configure terminal | vlan 10 | name VOICE

Which virtual network connection type assigns a VM its IP address from the physical network? a. Host-only b. NAT c. Private d. Bridged

d. Bridged Although a bridged vNIC communicates through the host's adapter, it obtains its own IP address, default gateway, and subnet mask from a DHCP server on the physical LAN. In NAT mode, the VM obtains IP addressing information from its host rather than from a server or router on the physical network. In host-only mode, VMs use the DHCP service in the host's virtualization software to obtain IP address assignments. In Hyper-V, the host-only connection type is created by assigning VMs to a private virtual network.

Which protocol balances traffic across multiple links? a. LACP b. CARP c. VIP d. VRRP

a. LACP LACP (Link Aggregation Control Protocol) dynamically coordinates communications between hosts on aggregated connections

Which cloud service model gives software developers access to multiple platforms for testing code? a. IaaS b. PaaS c. SaaS d. XaaS

b. PaaS

What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames? Flow control Spanning tree Port security Link aggregation Stop and wait mechanism

Flow control

What needs to be done with a newly added network adapter to be able to configure NIC teaming? Configure the adapter just with a DNS server Leave all configurations as default Configure the adapter to receive an IP address from a DHCP server dynamically Configure the adapter with a static IP address in the correct range

Configure the adapter with a static IP address in the correct range


Conjuntos de estudio relacionados

Simulation Lab 1.1: Module 01 Configure Microsoft Windows Sandbox

View Set

increasing and decreasing functions

View Set

5.1 & 5.2 Quiz Review (Honors) - History of the Periodic Table & Groups

View Set

Chapter 19: Conditions Existing Before Conception: PREPU

View Set