practice test C

¡Supera tus tareas y exámenes ahora con Quizwiz!

broadcast domains are created when an unmanaged 12-port switch is used?

1

T1 crossover cable

1 > 4, 2 > 5, 4 > 1, and 5 > 2 is for a T1 crossover cable.

IEEE 802.3 standards support up to 30 workstations on a single segment?

10Base2

in a company has to create a subnet for 500 host machines. The technician is instructed to use a class B address scheme and leave possible rooms for additional subnets of the same size. Which of the following would fulfill these requirements?

172.18.0.0/23

setting up a wireless access point for a SOHO location. The user has demanded exclusive use of the 5GHz band.

802.11ac

wireless connection types utilize MIMO on non-overlapping channels?

802.11ac 802.11n

types of DNS records

A PTR NS MX SRV CNAME

Which of the following IP addresses is reserved for private use?

A 10.0.0.0 - 10.255.255.255 B 172.16.0.0 - 172.31.255.255 C 192.168.0.0 - 192.168.255.255

CNAME

A canonical name record that is an alias of an existing record allowing multiple DNS records to map to the same IP address

SRV

A generalized service location record that is used for newer protocols instead of creating protocol-specific records such as MX

MX

A mail exchange record that maps a domain name to an email server for that domain

Naming Conventions

A naming system or convention, which guides and organizes labeling and ensures consistency.

PTR

A pointer record that points to a canonical name

Layer 1 technology allows a single PRI to deliver multiple voice calls simultaneously?

A single PRI delivers multiple voice calls simultaneously using Time-division multiplexing (TDM). TDM supports different communication sessions on the same physical medium by allowing sessions to take turns.

An attacker floods a switch with frames in an attempt to redirect traffic to his own server. Which of the following attacks is the attacker most likely using?

ARP poisoning

A

An address record that maps a hostname to an IPv4 address

service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary data center. The Chief Information Officer (CIO) is concerned because the contract doesn't include a long-term strategy for extended outages. Which of the following should the CIO complete?

Business continuity plan

multiple attempts to scan network hosts and devices originating from a single host on the network

Compromised system

OSI model is the functioning layer for ATM

Data link Layer

NS

Delegates a DNS zone to use the given authoritative name servers

backup strategy contains the changes in data since the last full backup?

Differential

has decided to teach basic network troubleshooting to some of the end users. However, it has to be done remotely and most of the users are non-technical. Which of the following documents should the network technician consider for effective transfer of knowledge?

Equipment labeling

he routing protocol must support IPv4 and VLSM. Based on these requirements, which of the following should the network administrator use?

IS-IS OSPF

is not able to access the shared printer and other resources. However, she can reach the Internet. Other users are not having any such problem.

Incorrect VLAN assignment

While diagnosing the issue, he confirms that the router is configured, the cable is connected, but the T1 is down. Which of the following tools should the network technician use to verify the configuration of the router?

Loopback adapter

characteristics of a jumbo frames

MTU > 1500 Used in SAN Improve network performance

A network administrator has to implement a physical security control method that can prevent an attacker from gaining access to a network closet or server room. Which of the following will help in achieving this goal?

Mantraps Proximity readers

A network technician is receiving complaints from the management board that they are unable to do meetings from the conference room. The network is too slow and there are frequent disconnections. The network technician finds that the conference room and cafeteria are located on either side of a single hallway where there is only one access point. He also observers that there are large number of people in the cafeteria. Which of the following best describes the cause of this issue?

Overcapacity is the main cause of the issue, as there is only a single access point connecting the users in the conference room and cafeteria. Wireless users share the same frequency channel to communicate to the same access point. If too many users are connecting to the same access point at the same time, they will start experiencing slowness and packet drops due to overcapacity.

A company wants a cloud service solution that can provide a deployment platform for its applications and it doesn't need to worry about the infrastructure requirements. Which of the following cloud services should be used for this purpose?

PaaS

multiple JSON and XML edits. This relates to an operation at which of the following OSI layers?

Presentation

Layer 3 of the OSI model to determine the path to a different network?

RIP

not considered link state routing protocols?

RIP RIPv2

802.1q tagged frames

Router Layer 3 switch

an email server that will use secure protocols. On completing the upgrade, which of the following ports on the firewall should be configured to allow for connectivity?

SMTP is used for sending emails while POP3 and IMAP are used for receiving emails. However, the default ports are not secure and since the network technician has to configure the email server using secure protocols, the ports that should be configured on the firewall are TCP ports 587, 993, and 995.

technologies allows for redundant links within a Layer 2 segment?

Spanning Tree

a network topology that is scalable and easy to troubleshoot. Which of the following topologies would the network technician use?

Star

Management requests the network administrator to change the wireless network so that it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should the network administrator change on the network?

The network administrator should change the power levels on the wireless network to stop the signals from reaching the parking lot. Maintaining the correct power levels on a wireless network is very important.

This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?

The network technician should use a load balancer for this purpose. A load balancer is a device that is used to distribute network or application traffic across multiple computers or networks.

random survey found that some of the employees were watching sports channels on their systems. Which of the following policies is being violated by the mentioned incident?

acceptable use policy (AUP) defines a set of rules that restrict how a network or a computer system may be used. It defines what a user can or cannot do with his or her computer during business hours.

Incremental

backup backs up only data that has changed since the previous backup.

A company wants to secure its WLAN network by implementing a method that will provide a web page before the users asking for authentication credentials before allowing them access to the network. Which of the following will help in satisfying this requirement?

captive portal is a web page to which users are directed when they attempt to connect to the WLAN. It appears before the user is able to access the network resource.

dig

command queries the DNS related information.

ping -f

command sets the Don't Fragment flag in the packet for IPv4 addresses only

ping -i TTL

command specifies the Time to Live (TTL) of the packet.

ping -n count

command specifies the number of echo requests to send.

ping -s count

command specifies the time stamp for count hops in IPv4 addresses only.

Standard operating procedure

describes a best practice approach for executing tasks related to the production and maintenance of hardware and software, as well as incident and change management.

Circuit Labeling

entering the facility should also be labeled. Label electrical receptacles, circuit breaker panels, and power distribution units. Include circuit information, voltage and amperage, the type of electrical receptacle, and where in the data center the conduit terminates.

Ethernet crossover cable

is 1 > 3, 2 > 6, 3 > 1, and 6 > 2.

Port Labeling

on switches, patch panels, and other systems should be properly labeled, and the wall outlets to which they lead should match.

System Labeling

that are installed in racks, such as servers, firewall appliances, and redundant power supplies, should also be labeled with IP addresses and DNS names that the devices possess.

With the WPA2 standard in use, which of the following will provide both data confidentiality and data integrity?

uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Advanced Encryption Standard (AES) for encryption or confidentiality.


Conjuntos de estudio relacionados

Ch 38 Caring for Clients with a Fecal Diversion

View Set

PrepU ch. 36: Urinary Elimination

View Set

Wellness and Nutrition Module 9 Test Review

View Set

PEC Chapter 4 - Air-conditioning

View Set

Chapter 3- Demand, Supply, and Market Equilibrium

View Set

1523 Evidence Based Practice: Skin & Tissue Integrity

View Set

Exercise 7- The Integumentary System

View Set