Networking Test 1 help

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following consists of high capacity data storage devices in a distinctly defined network segment?

d. SAN

Which of the following server racks would you use for a bolt-free mounting?

d. Square-hole racks

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

d. Static VLAN assignment

Which of the following protocols transfers files without any authentication or security?

d. TFTP

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

d. VLSM

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC.

netstat

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

a. Port 3389

You are a network technician who, on inspection, has found that one of the cables is faulty as a result of which you now have to insert a new piece of twisted pair into the data receptors to complete the circuit. Which of the following will you apply to sort this issue?

a. Punchdown tool

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them?

SDS

Which of the following multiplexing technologies would you use with fiber-optic cable?

WDM

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements.

biz

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?

b. iSCSI

You are running the netstat command to list all active TCP/IP connections of the local machine. However, you now want to have access to the routes used by the network hosts to reach the particular network destinations. Which of the following commands will you apply in such a situation?

b. netstat -r

What is a graphical representation of network devices and connections known as?

d. A network diagram

Which of the following is an enclosed space that holds network equipment?

d. Data room

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

d. RDP

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

d. Unicast address

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as?

Rollback

The IT department at Zatar Airways has complained of a faulty fiber-optic cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected?

TDR

Which of the following addresses can be identified as an APIPA address?

b. 169.254.0.1

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

b. Patch cable

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

c. switchport trunk native vlan

Mr. Walker plans on manufacturing a new line of twisted-pair cables for Ethernet Networks. To do so and to compete with the other brands circulating in the market, he has to get his cable qualified as per certain standards. Which of the following points should he emphasize to get his cable TIA/EIA certified?

a. Effective throughput

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.

b. Identification

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

b. Out-of-band management

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?

d. OFDMA

Which command displays the full list of available objects and commands?

d. ip help

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function?

3

What is the secure port for HTTPS?

443

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

d. Well-known ports

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered?

CAN

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.

Identification

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

As a senior network engineer, which of the following would you use when you are setting up a network connection at a university and you have to connect and organize lines running from walls to racks to network devices?

a. Patch panels

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

a. Resolvers

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them?

a. SDS

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

a. Stack master

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful.

a. ping 8.8.8.8

As a network engineer, you have been tasked to form a Gigabit Ethernet for connecting a data center with a data closet in an office building. Identify which of the following fiber Ethernet standards would you apply in this situation.

b. 1000BASE-FX

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

b. 255.254.0.0

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

b. A more negative RSSI value indicates a higher quality of signal.

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

b. Spectrum analyzer

Which of the following is the third step in a network troubleshooting methodology?

b. Test your theory to determine the cause.

You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario?

b. VoIP

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

b. WPS attack

The process of designing, implementing, and maintaining an entire network is called _____.

b. a system life cycle

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?

b. nmap

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful.

b. ping 8.8.8.8

The part which identifies the network in an IPv4 address is known as _____.

b. the network ID

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

c. 2.4 GHz-2.4835 GHz

You are a junior technician at KVM Solutions. They have just received a query from a university who wants their network connection to be set up. You have been tasked with sketching a diagram for the various network devices that will be used to establish the connection. Which of the following options would you apply to identify the routers in that connection?

c. A hockey-puck shape with two arrows pointing inward and two arrows pointing outward

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?

c. A network operating system is much more expensive than a desktop operating system.

Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario?

c. A star topology

In order to achieve the utmost fault tolerance, as a network administrator, you want to ensure that critical devices are all equipped with redundant NICs, routers, and processors, which are able to immediately assume the duties of an identical component in case one of the components fails. Which of the following will help you ensure these devices contain the necessary components you require?

c. Automatic failover

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

c. Cat 6a

You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?

c. ESP

Yang, a network engineer, has been tasked with establishing a new long-distance connection for the branch offices between Manhattan and Texas by an ISP. In doing so, analyze which of the following cables he should opt for in order to obtain maximum speed and bandwidth.

c. Fiber optic cable

What should you do once you have tested your theory to determine the cause of the problem at hand? Establish a plan for resolving the problem. b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes.

c. Incorrect. Call tracking systems to document problems and resolutions are the final stages in such a scenario.

While programming an IP packet, Kiara, a network programmer, gets to know that the packet has not reached the destination and has been sent back because the allotted TTL has expired. Now, as the device was running on an IPv6 packet, analyze which of the following protocols should Kiara opt for so that such errors do not arise in the future?

c. NDP

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?

c. Port 22

You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?

c. Rapid elasticity

What are larger data rooms also known as?

c. Telecommunications room

Which of the following security threats involves an interception of the network keys communicated between clients and access points?

c. WPA attack

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____.

c. a router-on-a-stick

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). While setting up the network for one of your clients, he wants you to check whether sufficient security precautions have been taken to ensure none of the customer's switches becomes the ISP's root bridge. Which of the following will you use in this scenario to ensure that the appropriate security measures have been taken?

d. A root guard

A client who has a small office setup has complained about a faulty wired connection in their LAN as a result of which they are unable to use the broadband service to access the Internet. You, as a network technician, have to solve the matter. Which of the following will you need to access the situation?

d. A wiring diagram

As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water?

d. Install cable through conduits.

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable?

d. Media converter

Larry is a senior technician who has to document the recent troubleshoot he carried out at Kroger Industries related to the baseline configuration of network devices. Larry is still unsure as to what category type he should document the troubleshoot so that it falls under standard operating procedures. Analyze which of the following category types Larry should opt for in such a scenario.

d. Network configuration

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

d. Network layer

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

d. Presentation layer

What is help desk software used for?

d. To document problems and their resolutions

You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature?

d. The management plane

As a developer, you need frequent access to multiple platforms during the development process. Rather than purchasing and maintaining a separate device for each platform, you have decided to avail the cloud service option. You are looking to build and test the applications within these virtual, online environments, which are tailored to the specific needs of the project. The cloud service model should have servers that provide only the resources needed to run an application and also allow customers to run their code directly in the cloud without having to manage a server environment at all. Which of the following cloud service models do you think would be appropriate considering your requirements?

PaaS

6. You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand?

RAID

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?

a. A layer 3 switch

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

a. An RFP

You have been getting complaints about slow speed from one of your clients. You decide to visit the site to have a look, and you notice that the RJ-45 connector has been tampered with as a result of which there are network fluctuations. These fluctuations are taking place as the pins in the connectors are bent. Which of the following tools will you use to push the pins inside the RJ-45 connector?

a. Cable crimper

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand?

b. Backbone cabling

What other technical name or PDU can be used to represent the session presentation and application layer?

b. L7PDU


Conjuntos de estudio relacionados

Module 12 Quiz - Digital Forensics

View Set

Ethical and Appropriate Uses of Administrative Data for Research and Evaluation

View Set

PHARM PRACTICE QUESTIONS CHAP 15

View Set

Lesson 12/Chapter 27: Human Development and Inheritance

View Set

SOCIOLOGY EXAM 2: Chapter 9: Constructing Gender and Sexuality

View Set

Chapter 12: Demand Planning & Forecasting

View Set

Ch 4 Social Statistics: Variability

View Set