Networking II - CNT3504

¡Supera tus tareas y exámenes ahora con Quizwiz!

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use? • Straight-through • Crossover • RG-6 • Rollover

Rollover Use a rollover cable to connect a workstation to the console port of a router or a switch. The rollover cable has an RJ-45 connector on one end to connect to the console port, and a serial connector on the other end to connect to the serial port of the workstation. You then run a terminal emulation program on the workstation to connect to the console of the router or switch to perform configuration and management tasks.

You manage the two-location network shown in the exhibit. Workstations and servers at each location connect to a patch panel using behind-the-wall wiring. The patch panel then connects network hosts to one of three 1000BASE-T switches. Routers are implemented at each location to connect the two networks together using a private WAN. The switch ports have auto-MDIX disabled. Drag the cable type on the left to the most appropriate network location on the right. Each cable type can be used more than once. Drag • Cat 3 straight-through UTP • Cat 3 crossover UTP • Cat 6 straight-through UTP • Cat 6 crossover UTP • Multimode fiber optic • Single-mode fiber optic Drop A. Drop cables B. Patch cables C. Uplink cables D. WAN cable

A. Drop cables: Cat 6 straight-through UTP B. Patch cables: Cat 6 straight-through UTP C. Uplink cables: Cat 6 crossover UTP D. WAN cable: Single-mode fiber optic

Use the exhibit to match the connector type on the left with the corresponding letter on the right.

A: DB-25 B: DB-9 C: RJ45 D: RJ11 E: LC F: BNC G: F-Type

Besides protecting a computer from under voltages, a typical UPS also performs which two actions: • Prevents ESD • Conditions the power signal • Prevents electric shock • Protects from over voltages

Conditions the power signal Protects from over voltages

Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Microsoft Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe? • Security Portal • Admin Portal • Company Portal • Account Portal

Admin Portal The Admin Portal in Windows Intune is used to manage enrolled devices, including sending remote wipe commands. The Account Portal in Windows Intune is used to manage subscriptions, users, groups, and domains. End users can also use the Account Portal to manage their passwords. The Company Portal in Windows Intune is used by end users to manage their own account and enroll devices. Windows Intune does not provide a Security Portal.

Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems? • Add a separate A/C unit in the server room • Add a de-humidifier to the server room • Add a humidifier to the server room • Add line conditioners in the server room

Add a separate A/C unit in the server room Keep temperature between 70 and 74 degrees to prevent components from overheating. In many cases, the server room will be the hottest location in your building because of the heat generated by the computer components. In most cases, you will need a separate A/C unit installed to the server room so that you can maintain the temperature in the server room without adversely affecting the rest of the building. Keep humidity between 40 and 60 percent to prevent electrostatic discharge (ESD).

Which technologies are used by the 802.11ac standard to increase network bandwidth? (Select two.) • Four MIMO radio streams • Data compression • Eight MIMO radio streams • 40 MHz bonded channels • 80 MHz bonded channels

Eight MIMO radio streams 80 MHz bonded channels

Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 meters long? • 1000BaseZX • 1000BaseT • 1000BaseCX • 1000BaseSX

1000BaseSX

With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is:

- 100 meters Tip: All Ethernet networks that use twisted pair cable (Ethernet, Fast Ethernet, Gigabit Ethernet) have a distance limitation of 100 meters

Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment length allowed?

- 100 meters Tip: All Ethernet networks that use twisted pair cable (Ethernet, Fast Ethernet, Gigabit Ethernet) have a distance limitation of 100 meters

Which of the following use the CSMA/CD access method? Select all that apply. • 1000BaseT • Token Ring • FDDI • 10BaseT

- 1000BaseT - 10BaseT CSMA/CD stands for Carrier Sense Multiple Access / Collision Detection. It defines the steps network devices take when two devices attempt to use a data channel simultaneously. Ethernet networks use CSMA/CD, including 10BaseT, 10Base2 and 1000BaseT.

Which of the following Ethernet standards uses fiber optic cabling? (Select two.) • 1000BaseCX • 100BaseT4 • 100BaseFX • 100BaseTX • 1000BaseLX

- 100BaseFX - 1000BaseLX

Which of the following physical topologies are used with Ethernet networks? (Select two.) • Ring • Bus • Mesh • Star

- Bus - Star Ethernet networks use either a physical bus or physical star topology. Hubs can also be cascaded to form a tree topology.

Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate. Drag • Wi-Fi triangulation • Cell phone tower triangulation • IP address resolution • GPS Drop • Most accurate • More accurate • Less accurate • Least accurate

- Most accurate => GPS - More accurate => Wi-Fi triangulation - Less accurate => Cell phone tower triangulation - Least accurate => IP address resolution

You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber-optic cabling. Which Ethernet standard could you implement in this situation? • 1000BaseZX • 1000BaseCX • 1000BaseT • 1000BaseLX • 1000BaseSX • 10BaseFL

1000BaseCX The 1000BaseCX standard specifies 150-ohm STP cabling. The maximum cable length is 25 meters. The 10BaseFL, 1000BaseSX, 1000BaseLX, and 1000BaseZX standards employ fiber-optic cabling. 1000BaseT uses Category 5 UTP instead of STP cabling.

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.) • 10GBaseER • 1000BaseCX • 1000BaseT • 1000BaseSX • 10GBaseSR • 10BaseFL

1000BaseSX 10GBaseSR

You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementation? (Select two.) • 10GBaseLR standards • 10GBaseER standards • Multimode fiber • Single mode fiber • 10GBaseSR standards

10GBaseLR standards Single mode fiber

Which of the following standards is used by SONET? • 10GBaseER • 10GBaseLW • 1000BaseLX • 1000BaseCX • 1000BaseSX

10GBaseLW 10GBase standards ending in W are used for SONET implementations. These include 10GBaseSW (short), 10GBaseLW (long), and 10GBaseEW (extended). 10GBaseER is for extended fiber optic but not used with SONET. 1000Base standards are not used for SONET. 1000BaseCX is a copper cable specification.

How many total channels are available for 802.11g wireless networks?

11 802.11b and 802.11g use the 2.4 GHz range which has a total of 11 channels in the US. 802.11a wireless uses the 5.75 GHz range which has a total of 23 channels.

Which data transmission rate is defined by the IEEE 802.11b wireless standard? • 2 Mbps • 10 Mbps • 11 Mbps • 56 Mbps

11 Mbps The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps. Wireless network interface cards and wireless access points (also called wireless hubs or wireless routers) will automatically negotiate the best transmission speed up to 11 Mbps based on current network traffic load and the quality of the wireless connection between the client and access point. The wireless communications are affected by distance, dense physical obstructions, and other electromagnetic interference producing devices. The IEEE 802.11a standard defines wireless transmission rates up to 2 Mbps. The IEEE 802.11g standard defines wireless transmission rates up to 56 Mbps. The IEEE 802.3 standard defines Ethernet 10baseT cable based transmissions of 10 Mbps.

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.) • 900 MHz • 1.9 GHz • 2.4 GHz • 5.75 GHz • 10 GHz

2.4 GHz 5.75 GHz

You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?

2000 meters

How many total channels are available for 802.11a wireless networks?

23 802.11a wireless uses the 5.75 GHz range which has a total of 23 channels. 802.11b and 802.11g use the 2.4 GHz range which has a total of 11 channels in the US.

Which of the following equipment will also fit in this rack along with the above equipment? • 2U UPS • 4U firewall • 4U UPS • 3U server

2U UPS The height of a rack is measured in rack units (U's). A rack unit (1U) is 1.75 inches tall and represents one slot in the rack. When purchasing rack-mounted network devices, you'll notice that their height is specified in rack units. For example, a 2U server is 3.5" tall and fills 2 slots in a server rack. In this scenario, the 16U rack already has 14U of equipment installed. Therefore, only a device 2U (or less) in height can be installed.

What is the frequency of 802.11a networking? • 900 MHz • 1.2 GHz • 2.4 GHz • 5.75 GHz

5.75 GHz 802.11a wireless operates in the 5.75 GHz range. 802.11b and 802.11g operate in the 2.4 GHz range.

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? (Select two.)

802.11a 802.11n

Which IEEE standard describes wireless communication? • 802.3 • 802.5 • 802.11b • 802.2 • 802.7b

802.11b

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) • Bluetooth • 802.11b • 802.1x • 802.11g • 802.11a

802.11g 802.11a Both the 802.11a and the 802.11g wireless standards specify maximum transmission speeds up to 54Mbps. The 802.11b wireless standard provides transmission speeds of 11 Mbps. 802.1x is a wireless security standard that provides an authentication framework for 802-based networks.

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run at 54 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? • 802.11g • 802.11b • 802.11c • 802.11a • 802.11d

802.11g 802.11g is the best choice for this client. While both 802.11a and 802.11g can each operate at 54 Mbps, 802.11a isn't compatible with 802.11b network boards. 802.11g access points, on the other hand, are backwards-compatible with 802.11b equipment. Using this type of access point will allow the wireless network to continue to function during the transition.

You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

802.11g The 802.11a wireless standard offers speeds of 54 Mbps but uses the 5 GHz frequency range. 802.11b uses the 2.4 GHz frequency range but supports only 11 Mbps transfer speeds. Bluetooth does operate at the 2.4GHz radio frequency range but is limited to theoretical speeds of 1 to 3 Mbps and transmission distances of 33 feet.

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? • 802.11g • 802.11n • 802.11a • 802.11b

802.11n

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards will work best in this situation? (Select two.) • 802.11n • 802.11b • 802.11d • 802.11a • 802.11g

802.11n 802.11a

Your organization recently purchased 18 iPad tablets for use by the organization's management team. These devices have iOS pre-installed on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is a part of a complete solution.)

Configure and apply security policy settings in a mobile device management system. Enroll the devices in a mobile device management system.

You are designing an update to your client's wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? • 802.11b • 802.11a • 802.11d • 802.11n

802.11n 802.11n is the best choice for this client. 802.11a operates at a maximum speed of 54 Mbps. 802.11a isn't compatible with 802.11g network boards. 802.11b runs at only 11 Mbps. 802.11n access points are backwards-compatible with 802.11g equipment and run at speeds of up to 600 Mbps. Using this type of access point will allow the wireless network to continue to function during the transition.

You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ45 port. You need to set up the network with the following in mind: • Spend as little money as possible. • Do not purchase unnecessary equipment. • Computers need to have a gigabit connection to the network. • New devices should not require management or configuration. You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs. What should you purchase?

An unmanaged switch and CAT5e cabling. Switches offer guaranteed bandwidth to each switch port and full-duplex communication. Unmanaged switches are autonomous in their function, requiring no port management or configuration. CAT5e cabling supports transfer speeds up to 1000 Gbps.

Which of the following is the best recommendation for applying hotfixes to your servers?

Apply only the hotfixes that apply to software running on your systems Be sure to test patches before applying patches within your organization. A common strategy is to: 1. Apply and test patches in a lab environment. 2. Deploy patches to a set of systems, such as a single department. 3. Deploy patches system-wide. You do not necessarily need to install every hotfix, patch, or service pack that is released. For example, if a hotfix applies to a service that you have disabled on your servers, applying that hotfix is not required. Service packs typically include all hotfixes and patches that have been released up to that point in time.

You provide IT support under contract for a dentist's office. The office has a limited number of wireless clients, so a simple wireless router is used to provide WiFi access. On your latest visit, you check the manufacturer's website and discover that an update has been released by the wireless router manufacturer. You decide to download and install the update. Click the option you should use in the wireless router's configuration interface to prepare the device for the update.

Backup Configurations Prior to applying the update, you should back up the wireless router's existing configuration. That way, you can restore the device to a working state in the event the update causes more problems than it solves.

You are building a wireless network within and between two buildings. The buildings are separated by more than 3000 feet. The wireless network should meet the following requirements: • Wireless data within Building 1 should be protected with the highest degree of security. • Wireless data within Building 2 should be accessible and permitted by any wireless client. • Wireless signals between Buildings 1 and 2 should be protected with the highest degree of security. • Wireless signals within Buildings 1 and 2 should cover the whole structure, but not extend to the outside. For each location on the image below, you need to select the following: • Antenna option • Security option Tip: Drag the items from the list on the left to the location identifier on the right. Items may be used more than once. Not all items will be used.

Building 1 - Location A WPA2 with CCMP Right-facing Directional Antenna Building 1 - Location B WPA2 with CCMP Omni Directional Antenna Building 1 - Location C WPA2 with CCMP Left-facing Directional Antenna Building 1 - Location D WPA2 with CCMP Right-facing Parabolic Antenna Building 2 - Location A WEP with Open authentication Omni Directional Antenna Building 2 - Location B WPA2 with CCMP Left-facing Parabolic Antenna

Consider the network diagram shown below. Click on the item in the diagram that does not follow a standardized labeling scheme.

By reviewing this diagram, you can see that the following labeling convention is used: • Workstations = WSxx • Notebooks = NBxx • Servers = FSxx • Switches = SWxx • Routers = RTRxx The workstation labeled PC2 does not conform to this labeling standard.

Which of the following are requirements of the 1000BaseT Ethernet standards? (Select three.)

CAT 5 cabling RJ-45 connectors The cable length must be less than or equal to 100m

All of the 802.11 standards for wireless networking support which type of communication path sharing technology? • Polling • Token passing • CSMA/CD • CSMA/CA

CSMA/CA 802.11x standards for wireless networking all support the CSMA/CA (carrier sense multiple access with collision avoidance) type of communication path sharing technology. This CSMA/CA allows for multiple baseband clients to share the same communication medium. CSMA/CA works as follows: 1. The system asks for permission to transmit. 2. A designated authority (such as a hub, router, or access point), grants access when the communication medium is free. 3. The system transmits data and waits for an ACK (acknowledgment). 4. If no ACK is received, the data is retransmitted.

The media access control method of all Ethernet networks is __________

CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is the media access control method of all Ethernet networks.

Which wireless technology is used to enable 802.11a-ht and 802.11g-ht networks to emulate 802.11n network speeds? • Data encapsulation • Data compression • Channel bonding • "Borrowing" radio frequency bands below 1 GHz

Channel bonding

Which of the following enterprise wireless configuration strategies best keeps public wireless access separate from private wireless access?

Configure a guest access WLAN that uses open authentication and that isolates guest WLAN traffic from other clients on the same access point.

You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network to connect to it. What should you do?

Configure a profile on the wireless client. When the SSID broadcast is turned off, you must manually configure a profile on the client computer to identify the SSID of the access point. By disabling the SSID broadcast, wireless devices must be statically configured with the SSID before they can connect because they will be unable to dynamically detect the SSID.

You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?

Connect one server through a different ISP to the Internet. In this scenario, the ISP is the single point of failure. If the ISP connection goes down, then the website is unavailable. Connecting one server to a different ISP, or both servers to two ISPs, will provide redundancy for the connection.

You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?

Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5. When terminated with an RJ-45 connector on both ends, the wires within the connectors are rolled over to the opposite connector as follows: • Pin 1 is connected to pin 8 • Pin 2 is connected to pin 7 • Pin 3 is connected to pin 6 • Pin 4 is connected to pin 5 A crossover cable uses the T568A standard on one end and the T568B standard on the other end. The crossover cable connects pin 1 with pin 3 and pin 2 to pin 6. Connecting each pin to the same pin on the other end creates a straight-through cable.

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use? • Straight-through • Crossover • Loopback • Rollover

Crossover Use a crossover cable to connect a workstation or a router to the uplink port on a switch. Use a straight-through cable to connect the router to a regular switch port. Use a rollover cable to connect a workstation to the console port of a router. Use a loopback plug to allow a device to communicate with itself through its own network adapter.

You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use? • Crossover • Rollover • Loopback • Straight-through

Crossover Use a crossover cable to connect two switches through their uplink ports, or to connect the two switches through regular ports. Use a straight-through cable to connect the uplink port on one switch to a regular port on another switch. Use a rollover cable to connect a workstation to the console port of the switch. Use a loopback plug connected to a single port for troubleshooting.

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use? • Loopback • Straight-through • Rollover • Crossover

Crossover Use a crossover cable to connect two devices together in a back-to-back configuration. Use a straight-through cable to connect a workstation to a hub or switch port. Use a rollover cable to connect a workstation to the console port of a router or a switch. Use a loopback plug to allow a device to communicate with itself through its own network adapter.

Which wireless networking component is used to connect multiple APs together? • IBSS • STA • DS • BSS

DS The Distribution System (DS) is the backbone or LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.

You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do? • Create a wireless profile on the client. • Change the channel on the access point to a lower number. • Enable SSID broadcast. • Decrease the beacon interval.

Decrease the beacon interval. A beacon is a frame that is sent out periodically by the access point. The beacon announces the access point and the characteristics of the network (such as the SSID, supported speeds, and the signaling method used). To improve access times, decrease the beacon interval.

Your wireless network consists of multiple 802.11n access points that are configured as follows: • SSID (hidden): CorpNet • Security: WPA2-PSK using AES • Frequency: 5.7 GHz • Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do? • Implement antenna diversity. • Switch to TKIP encryption. • Double the bandwidth assigned per channel to 40 MHz. • Upgrade to 802.11a access points.

Double the bandwidth assigned per channel to 40 MHz. 802.11n access points provide an option to allocate double the bandwidth per channel (increasing it to 40 MHz), which results in double the data rate.

Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)

Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system.

Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloud-based Microsoft Intune account and configure mobile device security policies. You now need to apply those security policies to the end users' mobile devices. What should you do? (Select two. Each response is a part of the complete solution.)

Enroll the devices with the Intune service. Create a user account for each user who has a managed mobile device.

Ethernet 100BaseFX networks use what type of cabling? • Shielded twisted pair • Fiber optic • Unshielded twisted pair • Coaxial

Fiber optic

Match the wireless signaling method on the left with its definition on the right. (Not all of the signaling methods match a definition.)

Frequency Hopping Spread Spectrum (FHSS): Uses a narrow frequency band and hops data signals in a predictable sequence Direct-Sequence Spread Spectrum (DSSS): Breaks data into pieces and sends the pieces across multiple frequencies in a defined range. Orthogonal Frequency-Division Multiplexing (OFDM): Breaks data into very small data streams in order to send the information across long distances.

Which of the following is true of a wireless network SSID? • Is a 48-bit value that identifies an AP. • Allows devices to find a specific AP within an ESS. • Groups wireless devices together into the same logical network. • Used by STAs when roaming between APs.

Groups wireless devices together into the same logical network. The SSID, also called the network name, groups wireless devices together into the same logical network. • All devices on the same network (within the BSS and ESS) must have the same SSID. • The SSID is a 32-bit value that is inserted into each frame. The SSID is case sensitive. • The SSID is sometimes called the ESSID (Extended Service Set ID) or the BSSID (Basic Service Set ID). In practice, each term means the same thing; however, they are technically different.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis (typically monthly)? • Kernel fix kit • Targeted software patch • Hotfix • Service pack

Hotfix A hotfix is an operating system patch that corrects a specific known problem. Microsoft typically releases hotfixes monthly. Service packs include a collection of hotfixes and other system updates. Service packs are not released as often, but contain all hotfixes released to that time.

An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device? • Gateway • Patch bay • Hub • Router • Terminal

Hub

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have the problem resolved, but you would like to be able to manage the server remotely in case there is a problem. Which of the following protocols would you use for remote management? (Select two.) • PPPoE • PPTP • L2TP • PPP • ICA • VNC

ICA VNC There are multiple protocols that can be used for remote desktop connections. • Virtual Network Computing (VNC) was originally developed for UNIX. Applications using VNC include RealVNC, TightVNC, UltraVNC, and Vine Server. • Independent Computing Architecture (ICA) is the protocol used by Citrix products (WinFrame and MetaFrame/XenApp). • The Remote Desktop Protocol (RDP) is the protocol developed by Microsoft and used in Microsoft's Terminal Services, Remote Desktop, and Remote Assistance solutions. Aqua Connect has licensed RDP and created a version for Mac OS X as a server. PPP and PPPoE are protocols that are used to control remote access. Both provide for authentication, authorization, and accounting of remote access connections. PPTP and L2TP are VPN protocols that provide a secure connection through the Internet to a destination host or network.

The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons. The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet. Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored. What should you do?

Implement a guest network. A guest network that is isolated from the hotel's network would be the best choice in this scenario. The guest network could be configured to require wireless network users to abide by certain conditions before they are allowed access to the wireless network using a captive portal. For example, it could require them to: • Agree to an acceptable use policy. • Provide a PIN or password. • Pay for access to the wireless network. • View information or advertisements about the organization providing the wireless network (such as an airport or hotel). When a wireless device initially connects to the wireless network, all traffic to or from that device is blocked until the user opens a browser and accesses the captive portal Web page. After providing the appropriate code, traffic is unblocked and the host can access the guest network.

Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take? (Select two. Each response is a separate solution.)

Implement storage segmentation. Enable device encryption. When deploying new mobile devices, there are many things you should do to increase their overall security, including the following: • Segment personal data from organizational data on mobile devices. This storage strategy allows encryption to be applied only to sensitive organizational data on the device. It also allows only organizational data to be removed during a remote wipe, preserving personal data. • Enable device encryption. Data encryption ensures data confidentiality on the device.

You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.)

Install racks with locking doors. Install a biometric lock on the data center door.

You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. However, the power supplies in the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center? • Transformer • Inverter • Capacitor • Transistor

Inverter A power inverter changes direct current (DC) to alternating current (AC). In this scenario, a power inverter can be used to convert the DC power stored in the batteries to AC power that your servers, switches, and routers can use in an emergency.

Which of the following is true for a system image backup? • Is saved as a .vhd file. • Does not include user profile settings. • Is the only type of backup supported by the backup and restore console. • Can be saved to a Bitlocker-enabled volume.

Is saved as a .vhd file. A system image backup consists of an entire volume backed up to a .vhd file. It contains everything on the system, including the operating system, installed programs, drivers, and user data files.

The outside sales reps from your company use notebook computers, tablets, and phones to connect to the internal company network. While traveling, they connect their devices to the Internet using airport and hotel networks. You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed. When a host tries to connect to the network, the host should be scanned to verify its health. If the host is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the host can then connect to the production network. Which solution should you use?

NAC Network Access Control (NAC) prevents devices from accessing network resources unless they meet certain predefined security requirements. Conditions that can be part of the connection requirements include requiring that computers have: • Antivirus software with up-to-date definition files. • An active personal firewall. • Specific operating system critical updates and patches.

Which media types can backup files be saved to? (Select two.) • Network Attached Storage (NAS) • External hard drives • Tape drives • The system disk

Network Attached Storage (NAS) External hard drives Backups can be saved to: • Secondary internal hard drives • External hard drives • Optical drives • USB flash drives • Network shares • .vhd files • Network Attached Storage (NAS) or Storage Area Network (SAN). Backup files cannot be saved to: • The same disk being backed up • A system disk • A Bitlocker-enabled volume • A tape drive

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping. To provide power for the new devices, you will hire an electrician to install several new 20-amp wall outlets near the new rack. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. Will this configuration work?

No, you should consider relocating the new rack next to the existing rack.

You are adding a new rack to your data center, which will house five new blade servers. The new servers will be installed in a cluster that will host a customer tracking database. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to connect each new server to the switch in the existing rack using straight-through UTP cables that will be run along the floor around the perimeter of the data center. To provide power for the new devices, you will hire an electrician to install several new 20-amp wall outlets near the new rack. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. Will this configuration work?

No, you should run the cable around the perimeter of the room in a cable tray.

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environment monitoring device within the rack. Currently, the device shows the temperature within the rack to be 70 degrees Fahrenheit (21 degrees Celsius). What should you do?

Nothing, the temperature within the rack is within acceptable limits. The ideal temperature for computing equipment is around 68 degrees Fahrenheit (20 degrees Celsius). Therefore, a reading of 70 degrees Fahrenheit (21 degrees Celsius) within a server rack is not an issue of concern.

What topology is used with 100BaseTX Fast Ethernet networks? (Select two.)

Physical star/logical bus Physical star/logical star

You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?

Positive pressure system Positive pressure systems protect the air quality in the facility by causing air to be forced out through doors, windows, and other openings. Negative pressure systems draw air in, potentially bringing in airborne particles such as dust, smoke from a fire, or contamination from a chemical leak. Positive pressure systems are more energy effective.

Which of the following protocols or services would you associate with Window's Remote Desktop Services network traffic? • WPA • WTSP • RDP • NNTP

RDP The Remote Desktop Protocol (RDP) is used by Window's Remote Desktop Services based applications, including Remote Desktop Connection.

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use? • Telnet • FTP • SSH • RDP • TFTP

RDP To access the desktop of a remote computer or server, use a remote desktop protocol. RDP is Microsoft's remote desktop protocol, but other protocols include VNC and ICA.

Which of the following standards is typically used in a rollover cable? • RS-232 • RJ-11 • RG-58 • RG-6

RS-232 A rollover cable has a serial connector on one end and an RJ-45 connector on the other end. RS-232 is the standard for serial communications.

Even if you perform regular backups, what must be done to ensure that you are protected against data loss? • Write-protect all backup media • Restrict restoration privileges to system administrators • Store the backup media in an onsite fireproof vault • Regularly test restoration procedures

Regularly test restoration procedures

A smart phone was lost at the airport. There is no way to recover the device. Which if the following will ensure data confidentiality on the device? • GPS • Screen lock • TPM • Remote wipe

Remote wipe

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point, and to be able to roam between the two access points. How should you configure the access points? • Different SSID, different channel • Same SSID, different channel • Same SSID, same channel • Different SSID, same channel

Same SSID, different channel When configuring multiple access points as part of the same extended service set (ESS), configure both access points with the same Service Set Identifier (SSID). The SSID is like a network name, and groups wireless devices together into the same logical network. All devices, including wireless clients, use the same SSID. Wireless access points that are in the same area should use different channels. If the channels are the same or overlap, devices connected to one access point might interfere with devices connected to the other access point in locations where the signal overlaps.

Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity? • TPM • GPS • Screen lock • Remote wipe

Screen lock

Which of the following connectors is typically used on one end of a rollover cable? • F-type • SC • ST • Serial • BNC • LC

Serial A rollover cable has a serial connector on one end and an RJ-45 connector on the other end. Alternatively, it might have an RJ-45 connector on both ends, and a serial converter is used to convert from the RJ-45 connector to a serial connector.

Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?

Sign up for a Microsoft Intune account to manage the tablets.

You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system? • Signal strength • Wireless encryption in use • WAP placement • Wireless standard in use

Signal strength

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.) • 1000BaseCX • Single mode fiber • Mutimode fiber • 1000BaseSX • 1000BaseLX

Single mode fiber 1000BaseLX Of the standards listed in this question, 1000BaseLX provides the greatest cable length (think of the "L" in 1000BaseLX as "long"). When using long distances for fiber optic, use single mode fiber. Multimode fiber is cheaper but has a shorter maximum distance than single mode fiber.

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use? • Crossover • Straight-through • Loopback • Rollover

Straight-through Use a straight-through cable to connect a workstation or router to a regular switch port. Use a crossover cable to connect the workstation to the uplink port. Use a rollover cable to connect the workstation to the console port of the switch. Use a loopback plug to allow a workstation to communicate with itself through its own network adapter.

Which of the following is the least effective power loss protection for computer systems? • Surge protector • Backup power generator • Uninterruptible power supply • Secondary power source

Surge protector

You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? • UDP • TCP • RIP • TFTP • IP • FTP

TCP Write the application to use the Transmission Control Protocol (TCP). TCP guarantees delivery through error checking and acknowledgments.

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.) • AES encryption • TKIP encryption • BSSID • Channel • Preshared key

TKIP encryption Preshared key To connect to the wireless network using WPA, you will need to use a preshared key and TKIP encryption. When using a preshared key with WPA, it is known as WPA-PSK or WPA Personal.

You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix?

Test the hotfix, then apply it to all servers. In this scenario, you should test the hotfix, and following a successful test, apply the hotfix to all other servers. Applying it only to the server that was compromised will not protect other servers with the same vulnerability. A common testing strategy is to: 1. Apply and test patches in a lab environment. 2. Deploy patches to a set of systems, such as a single department. 3. Deploy patches system-wide.

A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?

The device listens to determine if the transmission media is free.

You have been struggling to keep the temperature in your server room under control. To address this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)

The rear of your servers should face the hot aisle. The front of your servers should face the cold aisle. The use of hot and cold aisles within the server room is an effective method for reducing the temperature. The front of your servers should face the cold aisle. This allows them to draw in cooler air to reduce the temperature of system components. The rear of your servers should face the hot aisle. This ensures the hot air is directed away from other server systems. The hot aisle should face the air conditioner's return duct. This allows the heated air to be cooled by the AC system. The cold aisle should face the air conditioner's output ducts. This ensures cool air is drawn into servers to cool their components.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range • An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system Because the 802.11b standard operates within the 2.4 GHz to 2.4835 GHz radio frequency range, the most likely culprit is the wireless TV distribution system.

What purposes does a wireless site survey serve? (Choose two.)

To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.

Why should backup media be stored offsite? • To reduce the possibility of theft • To prevent the same disaster from affecting both the network and the backup media • It improves the efficiency of the restoration process • It is a government regulation

To prevent the same disaster from affecting both the network and the backup media

Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center? • Capacitor • Inverter • Transformer • Transistor

Transformer A transformer is typically used to increase or decrease the voltage of AC power. For example, your electrical utility's transmission lines carry very high voltage electricity. To use this electricity within a home or business, a transformer is first used to step the voltage down to 110 volts.

What type of cabling is used with 100BaseTX Fast Ethernet networks?

Type 1A STP or Category 5 UTP

You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a username of admin and a password of admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.)

Use an SSH client to access the router configuration. Change the default administrative username and password. In this scenario, two key security issues need to be addressed: • You should use an SSH client to access the router configuration. Telnet transfers data in clear text over the network connection, exposing sensitive data to sniffing. • You should change the default administrative username and password. Default usernames and passwords are readily available from websites on the Internet.

Match each bring your own device (BYOD) security concern on the right with a possible remedy on the left. Each remedy may be used once, more than once, or not at all.

Users take pictures of proprietary processes and procedures. => Specify where and when mobile devices can be possessed in your acceptable use policy. Devices with a data plan can e-mail stolen data. => Specify where and when mobile devices can be possessed in your acceptable use policy. Devices have no PIN or password configured. => Enroll devices in a mobile device management system. Anti-malware software is not installed. => Implement a network access control (NAC) solution. A device containing sensitive data may be lost. => Enroll devices in a mobile device management system.

Which of the following are not reasons to remote wipe a mobile device?

When the device is inactive for a period of time.

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and for a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a cross-over UTP plenum cable that will be run through the suspended tile ceiling of the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device in the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.)

You should implement redundant power supplies for the network devices. You should implement a UPS between the wall outlet and the network devices. In this scenario, all devices in the new rack will go down if the power from the wall outlet fails for some reason (such as a power outage). To prevent this from happening, a UPS should be implemented between the wall outlets and the network devices. In addition, the power supplies used by computing equipment have finite life spans and fail frequently. Because these are mission-critical devices, you should consider implementing redundant power supplies.


Conjuntos de estudio relacionados

1601 Chapter 10 Practice Questions

View Set

Chapter 3 - Organizational Commitment

View Set

Cultural Characteristics of South and Southeast Asia, Natural Resources and Economies of South Asia

View Set

Chapter 74 Drug Therapy for Gout

View Set