Networking+ Pre / 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following network topology is most commonly used in a network infrastructure? Ring Bus Mesh Star

star

Which of the following network topology has a single point of failure? [Choose all that apply] Ring Mesh Bus Star

Bus Star

What is the minimum amount of ESD required to damage sensitive electronic equipment? a. 2 volts b. 800 volts c. 1,500 volts d. 10 volts

. 10 volts

What group must clients join to access network resources in a client-server network? a. Workgroup b. Domain c. RAID d. Peer Group

b. Domain

At what OSI layer does your browser's web page request begin its journey through the OSI layers? a. Data link layer b. Network layer c. Physical layer d. Application layer

d. Application layer

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent? a. Reserved b. Acknowledgment number c. Source port d. Sequence number

d. Sequence number (The sequence number in a TCP segment identifies the data segment's position in the stream of data segments being sent.)

Which of the following protocols is used to transfer files between two computers? FTP SMTP POP3 IMAP4

FTP

Which of the following represents a network of personal devices? PAN MAN WLAN SAN

PAN

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? POP3 SSH RDP Telnet

SSH (Secure Shell) protocols are mostly used for Linux operating systems to provide a secure remote access to the networks)

You have been called to troubleshoot a problem, and you have successfully managed to establish a theory of probable cause. You have managed to reach this layer after considering multiple approaches through the OSI model. Which recommended step should you perform next if you follow the OSI model of troubleshooting? Test your theory to determine the cause. Establish a plan for resolving the problem. Document findings, actions, and outcomes. Implement the solution or escalate the problem.

Test your theory to determine the cause.

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a. Hub-and-spoke b. Star c. Client-server d. Mesh

b. Star

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records? a. ip b. dig c. ping d. ipconfig

b. dig (dig utility is used to query DNS name servers for information about host addresses and other DNS records.)

In the event of a fire, the most appropriate failure policy is a _______ policy. a. Shutdown b. Power-off c. Fail-open d. Fail-close

c. Fail-open (During a fire alert using a fail-open policy, all exit doors stay unlocked so that people can safely leave the building and firefighters can enter the building,)

Which of the following is a secure protocol? a. FTP b. HTTP c. SSH d. TELNET

c. SSH

Which of the following is part of a network's physical topology? a. A network server's operating system b. Password for the wireless network c. A printer plugged into a nearby desktop computer d. File permission settings on a desktop computer

c. A printer plugged into a nearby desktop computer

Which of the following strategies can be used to identify the cause of an incident? [Choose all that apply] Implement a solution Test the theory Question people involved Gather information of the incident

Question people involved Gather information of the incident

What is the first step that needs to be taken when troubleshooting a network incident? Document the incident Identify the problem Establish a theory of the incident Remediate the incident

Identify the problem

Which of the following is an advantage of P2P file sharing? a. Inexpensive b. Secure c. Centrally controlled d. Scalable

a. Inexpensive

What is an example of an open source DBMS? a. TCP/IP suite b. Microsoft SQL Server c. MySQL d. Oracle Database

c. MySQL Popular examples of SQL database software include Microsoft SQL Server, Oracle Database, and the open-source MySQL.

Which OSI layer adds both a header and a trailer? a. Data link layer b. Transport layer c. Physical layer d. Network layer

a. Data link layer

In the client-server model, what is the primary secure protocol used for communication between a browser and web server? a. HTTPS b. TLS c. HTTP d. SSL

a. HTTPS (The primary protocol used by web servers and browsers (clients) is HTTP (Hypertext Transfer Protocol). When HTTP is layered on top of an encryption protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is HTTPS (HTTP Secure), which gives a secure transmission.)

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer? a. 23 b. 443 c. 80 d. 22

a. 23

In the formula 2h - 2 = Z, what does h represent? a. h equals the number of hosts available in each subnet. b. h equals the number of bits that must be switched from the host address to the network ID. c. h equals the number of bits remaining in the host portion. d. h equals the number of subnets that result.

c. h equals the number of bits remaining in the host portion. (In the formula, 2h - 2 = Z, h equals the number of bits remaining in the host portion.)

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign? a. SMTP b. FTP c. TLS d. SQL

d. SQL (Many DBMSs use the programming language SQL (Structured Query Language) to configure and interact with the database's objects and data.)

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system? a. DNS poisoning b. Deauth attack c. On-path attack d. Back doors

d. Back doors (Software might contain back doors, which are security flaws that allow unauthorized users to gain access to the system.)

You are a senior programmer for Mercantile Timber Ltd., and you have been tasked to develop a database that would contain all the user account information and security for the entire group of computers operating within Mercantile Timber Ltd. Can you apply any of the options provided? Workgroup RAID Hypervisor AD

AD (The centralized directory database that contains user account information and security for an entire group of computers is known as AD (Active Directory).)

What should you do after making a plan to solve a problem and carrying out your plan? a. Test your theory. b. Find out what has recently changed. c. Verify functionality. d. Document your work.

c. Verify functionality.

While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past? a. Instruction manual b. Safety data sheet c. Troubleshooting ticket in the call tracking system d. Knowledge base

d. Knowledge base

In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade? a. Hybrid b. Peer-to-peer c. Hub-and-spoke d. Client-server

d. Client-server (In the client-server network model, resources can be managed by Windows Server 2019 via a centralized directory database called AD)

Which fire suppression level provides the most targeted protection? a. Building level b. Room level c. Rack level d. Desk level

c. Rack level

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario. a. A star topology b. A mesh topology c. A bus topology d. A ring topology

c. A bus topology

Which of the following terms would you use when a server uses a hard disk as a backup in case a hard drive fails? Windows domain Router Raid Client

Raid

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario. a. 802.11a b. 802.11n c. 802.11g d. 802.11b

c. 802.11g (802.11g was designed to be just as affordable as 802.11b while increasing its maximum theoretical throughput with different data modulation techniques. 802.11g benefits from being compatible with 802.11b networks that allow older computers to have wireless access during an upgrade.)

Jasmine has been working as the chief accountant for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network administrator, has recently discovered that Jasmine is actually the same person who creates as well as authorizes the vendor account payments. Analyze if any of the following agreements has been violated in this scenario. a. Anti-malware policy b. NDA c. PUA d. AUP

c. PUA (A PUA (privileged user agreement), or privileged access agreement, addresses the specific concerns related to privileged access given to administrators and certain support staff.)

Which of the following is an application layer protocol? a. TCP b. IP c. RDP d. Apache

c. RDP (Several protocols are used at the application layer, including HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol, version 3), IMAP4 (Internet Message Access Protocol, version 4), FTP (File Transfer Protocol), Telnet, and RDP (Remote Desktop Protocol). Application layer protocols are used by applications and system utilities. IP (Internet Protocol) is a network layer protocol. TCP (Transmission Control Protocol) is a transport layer protocol. Apache is a web server application.)

What is the purpose of documenting an incident? To remediate an incident To identify the problem To establish a theory For future reference

For future reference

Which of the following network topology is most expensive to implement and maintain? Bus Mesh Ring Star

Mesh

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using? a. Mesh topology b. Bus topology c. Star topology d. Ring topology

c. Star topology

Which two encryption protocols might be used to provide secure transmissions for email services? a. SSL and TLS b. FTP and SFTP c. HTTP and HTTPS d. SSH and RDP

a. SSL and TLS (The email protocols SMTP, POP3, and IMAP4 are all available over SSL or TLS for security. HTTP and HTTPS provide communication between web servers and browsers. FTP and SFTP support the transfer of files between two computers. SSH and RDP provide secure, encrypted remote access from one computer to another.)

Mojaro Bank at Datona has contacted Vincent, a network provider, to provide Mojaro with a network connection that will enable it to securely conduct financial transactions with the other branches situated across various states in the United States as well as with the International Monetary Fund. Analyze which of the following connections would be best suited in this scenario. a. WAN b. MAN c. LAN d. CAN

a. WAN (WAN (wide area network) traverses a significant distance and usually supports very high data throughput. A WAN is more feasible when you need a wider geographical area.)

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network? a. WPS attack b. War driving c. WPA attack d. War chalking

a. WPS attack (WPS (Wi-Fi Protected Setup) requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network.)

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication? a. Establish a plan of action to resolve the problem and identify potential effects. b. Identify the problem. c. Test the theory to determine the cause. d. Document findings, actions, outcomes, and lessons learned.

b. Identify the problem. (While identifying the problem, approach each problem individually and solve it before moving on to the next. By the time you reach the steps of testing the theory, establishing a plan of action, and documenting results, solving multiple problems at once is likely already causing more problems.)

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario? a. 10 Gbps b. 1000 Mbps (1 Gbps, Gigabit Ethernet) c. 100 Mbps (Fast Ethernet) d. 10 Mbps

c. 100 Mbps (Fast Ethernet) (Cat 5 twisted pairs can support a maximum bandwidth of 100 Mbps and hence should be used in this scenario.)

JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario? a. IDF b. Patch panel c. Racks d. VoIP

c. Racks

Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements? a. SLA b. MOU c. SOW d. MSA

d. MSA (An MSA (master service agreement) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.)

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? a. Telnet b. POP3 c. RDP d. SSH

d. SSH

Which networking device is best for connecting your network printer to three computers? a. Switch b. Router c. Hub d. File server

a. Switch

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use? a. Hub-and-spoke b. Hybrid c. Ring d. Peer-to-peer

d. Peer-to-peer (Using a P2P (peer-to-peer) network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control. The computers, called nodes or hosts on the network, form a logical group of computers and users that share resources. The hub-and-spoke, ring, and hybrid models are all physical topologies, not logical topologies.)

What are the characteristics of a physical network topology? [Choose all that apply] A physical network topology displays the physical location of devices A physical network topology is a diagram of the network A physical network topology is a representation of the logical network A physical network topology displays the actual layout of the network

A physical network topology displays the physical location of devices A physical network topology displays the actual layout of the network

Your client has multiple LAN connections for his business. He wants you to install a device so that the traffic between two networks can be efficiently managed by finding the best path for traffic to get from one network to another. Which of the following will you use in this case? A combo device An industrial-grade router A consumer-grade router A switch

An industrial-grade router (Combo devices are often used by home networks as they function as both a switch and a router.)

Which of the following are advantages of a Mesh topology? [Choose all that apply] Connect the network to the Internet Ensure high-availability of the network connectivity Connect a wireless access point to the network Ensure redundancy of network connectivity

Ensure high-availability of the network connectivity Ensure redundancy of network connectivity

Where is the best practice to test theory for the probable cause of the incident? In the production environment In a sandbox solution On a stand-alone server On a stand-alone laptop

In a sandbox solution

Which of the following explains how to properly handle substances such as chemical solvents? Tracking system SDS Change management Knowledge base

SDS

Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario? a. Device types b. Departmental boundaries c. VLAN groups d. Geographic locations

b. Departmental boundaries (Departmental boundaries will include the Accounting, Human Resources, and Sales departments, so it should be grouped under this in this scenario.)

A client has complained of losing Internet connectivity. You as a network engineer troubleshoot the error, and you find that the source of the error is the computer's wired connection. You decide to solve the issue by replacing the wired connection with a wireless one. What kind of an issue are you resolving in this scenario? a. DNS issues b. Interface errors c. Router misconfiguration d. Interference

b. Interface errors (Misconfigured interfaces, such as an incorrect default gateway or missing DNS server addresses, can result in interface errors. One possible evaluation technique for bypassing an interface error, which will help confirm that the interface misconfiguration is the issue, is to switch to a different interface on the same device.)

Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands? a. Broad network access b. Rapid elasticity c. Measured service d. Resource pooling

b. Rapid elasticity

Neon Printers has set up a full network of laptops for the purpose of running multiple printing projects simultaneously. It has contracted Theo Solutions to provide network security solutions while protecting its network from certain traffic. Analyze which of the following is best applicable in this scenario. a. Using a host-based firewall b. Using a network-based firewall c. Using an HIDS d. Using a proxy server

b. Using a network-based firewall (A network-based firewall should be used to protect an entire network and not just a solitary device and hence is ideal in this scenario.) (Proxy servers provide low levels of securities when compared to firewalls) (HIDS (host-based intrusion detection system) runs on a single computer to detect attacks to a host,)

Which of the following applications could be used to run a website from a server? a. Hypertext Transfer Protocol b. FileZilla c. Ngnix d. Microsoft Exchange Server

c. Ngnix (Ngnix is one of the most popular web server applications in the world. Hypertext Transfer Protocol is a protocol used to communicate between web servers and web clients. FileZilla is an FTP client application. Microsoft Exchange Server is a popular email server application.)

Kevin Mills is a network technician who has been hired by Globcom Telecommunications to fix an error related to emails and messages. The error primarily did not allow the messages sent out by the HR department to arrive intact at the receiving applications on the employees' workstations. Kevin plans to follow the OSI model for troubleshooting. Analyze the statements and suggest which layer of the OSI model Kevin should inspect to understand and resolve the issue. a. The network layer is responsible for moving messages. b. One should check the physical layer in the OSI model. c. One should troubleshoot the issue using the session layer. d. The transport layer might be able to solve the issue related to the email.

c. One should troubleshoot the issue using the session layer. (The session layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.)

Which of these protocols could not be used to access a server in a nearby building? a. SSH b. RDP c. TLS d. Telnet

c. TLS TLS (Transport Layer Security) adds encryption to other protocols, such as HTTP, but does not provide remote access to a computer

Which layer holds the address (port#) of the target application running on the destination computer? a. Application layer b. Network layer c. Transport layer d. Data link layer

c. Transport layer

Which network types can your smartphone use? a. PAN b. WAN and LAN c. WAN, LAN, and PAN d. LAN e. WAN

c. WAN, LAN, and PAN When a smartphone communicates over the cellular network for phone calls, it is using a WAN across a wide geographical area. When a smartphone connects with your home network, it is using a LAN in your home. When a smartphone connects with Bluetooth ear buds, a fitness tracker, or a Bluetooth weight scale, it is using a PAN to connect devices intended for use by one person at a time.

Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue. a. By checking if the network is operating at maximum capacity b. By calculating the error rate c. By checking the interface statistics of the network d. By checking if the connection has any jitter

d. By checking if the connection has any jitter (All packets experience some latency. When successive packets experience varying amounts of latency, resulting in their arriving out of order, the user experience is degraded. This is called jitter, a problem that can be addressed through traffic management techniques.)

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? a. Wireshark b. Room Alert Monitor by AVTECH c. Spiceworks d. PRTG dashboard by Paessler

d. PRTG dashboard by Paessler (The data regarding CPU temperatures for your servers can be collected and monitored using the PRTG dashboard by Paessler.) (Wireshark is a type of protocol analyzer that monitors traffic on the interface between a single device and the network.) (Room Alert Monitor by AVTECH (avtech.com) displays sensor data on a configurable dashboard.) (Spiceworks is a type of network monitoring software that can be configured to monitor multiple devices on a network at one time.)

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario. A bus topology A star topology A mesh topology A ring topology

A bus topology (In a bus topology, all the devices are connected through a single cable instead of a central hub.)

You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario? a. MAC b. SoD c. DAC d. RBAC

b. SoD (SoD (separation of duties) refers to a division of labor that ensures no one person can single handedly compromise the security of data, finances, or other resources.) (DAC (discretionary access control) is a method of access control where users decide for themselves who has access to a particular user's resources.) (RBAC (role-based access control), a network administrator receives from a user's supervisor a detailed description of the roles or jobs the user performs for the organization.) (MAC (mandatory access control), a user is given access when the user's classification and category match those of a resource.)

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand? a. A BPDU guard b. A root bridge c. A BPDU filter d. A root guard

c. A BPDU filter (A BPDU filter disables STP on specific ports, so it should be used in this scenario to disable the demarc port.)

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario? a. L2TP b. OpenVPN c. GRE d. IKEv2

c. GRE (GRE (Generic Routing Encapsulation) is a layer 3 protocol that is used to transmit IP and other kinds of messages through a tunnel and should be used in this instance.)

The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario? a. Tone generator b. TDR c. OPM d. Tone locator

d. Tone locator (A tone locator is a device that emits an audible tone when it detects electrical activity on a wire and hence should be used in this scenario.)


Conjuntos de estudio relacionados

Interior Design Final Exam Review Packet

View Set

Kin 313 aquatic therapy mid term

View Set

Political Geography: Indian Tribal areas and Union territories

View Set

𝘊𝘏𝘈𝘗𝘛𝘌𝘙 8 ~ 𝘉𝘜𝘚𝘐𝘕𝘌𝘚𝘚

View Set