16.1.8 - Practice Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A web server on your network hosts the public website for your company. You want to make sure that a failure of the NIC in the server does not prevent the website from being accessible on the internet. Which solution should you implement? - Ethernet bonding - QoS - Traffic shaping - Spanning tree

Ethernet bonding

Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port? - Switch - Bridge - Router - Hub

Switch

What is the purpose of using Ethernet bonding? (Select two.) - Enables Dual Remote Access (DRA) over a WAN link. - Provides increased bus speeds. - Provides a fallover solution for network adapters. - Increases network performance. - Increases read and write operations between the system bus and network adapters.

- Provides a fallover solution for network adapters. - Increases network performance.

// This question includes an image to help you answer the question. http://prntscr.com/se0550 A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of you network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.) - Enable port security on each switch port. - Connect the patch panel to the switches with red cross-over cables. - Remove the patch cable connecting the first switch to the third switch. - Consolidate all patch cables from the patch panel to a single switch. - Enable STP on each switch. - Replace the patch cables connecting the switches together with red cross-over cables.

- Remove the patch cable connecting the first switch to the third switch. - Enable STP on each switch.

Which of the following statements about DSCP are true? (Select two.) - Classification occurs at Layer 2 - The DiffServ field is used to add precedence values. - Classification occurs at Layer 3. - Priority values are assigned by the network switch. - A priority value between 0 and 7 is used.

- The DiffServ field is used to add precedence values. - Classification occurs at Layer 3.

Match the class of service (COS) priority on the left with its corresponding value on the right. Drag - Video (< 100 ms latency) - Network control - Critical applications - Excellent effort - Best effort (default) - Internetwork control - Voice (< 10ms latency) - Background Drop - 0 - 1 - 2 - 3 - 4 - 5 - 6 - 7

0 - Best effort (default) 1 - Background 2 - Excellent effort 3 - Critical applications 4 - Video (< 100 ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control

Which Class of Service (COS) priority value should be assigned to a video conference call? - 7 - 2 - 0 - 5 - 4 - 3 - 1 - 6

4

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? - A caching engine - An application-specific integrated circuit - A traffic shaper - Ethernet bonding

An application-specific integrated circuit

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discover that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events. Which solution should you implement to protect the network while also allowing operations to continue as normal? - Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. - Install anti-virus software on the Windows 2000 workstations and configure Windows to automatically download and install updates. - Create a dedicated network for the Windows 2000 workstations that is completely isolated from the rest of the network, including a separate internet connection. - Implement a host-based firewall on each Windows 2000 workstation and configure Windows to automatically download and install updates.

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions. Which type of device should you choose? - Proxy server - Bandwidth shaper - Content switch - Circuit-level gateway

Content switch

Which of the following devices accepts incoming client requests and distributes those requests to specific servers? - Caching engine - Media converter - CSU/DSU - Load balancer - IPS

Load balancer

Drag the broadcast domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once. Drag - Single broadcast domain - Multiple broadcast domains Drop - Hub - Unmanaged switch - 802.11n wireless access point - Router - Bridge - Repeater - Layer 3 switch

Hub - Single broadcast domain Unmanaged switch - Single broadcast domain 802.11n wireless access point - Single broadcast domain Router - Multiple broadcast domains Bridge - Single broadcast domain Repeater - Single broadcast domain Layer 3 switch - Multiple broadcast domains

Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president to reduce internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection without decreasing performance. What is the best way to do this? - Implement NAT. - Install a packet-filtering firewall. - Install modems in employees' computers. - Install a proxy srever.

Install a proxy srever.

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? - Layer 2 switch - Layer 1 switch - Multilayer switch - Unmanaged switch

Multilayer switch

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task? - Virtual private networking (VPN) - Port security - Network segmentation - Data encryption using PKI

Network segmentation


Kaugnay na mga set ng pag-aaral

Microeconomics Chapter 1-3 Quizzes (add 4 after sunday)

View Set

Changes in Period and Phase Shift of Sine and Cosine Functions

View Set

I/O Psych fill in the blanks, I/O Psych Final 3/3, I/O Psych Final 1/3, Industrial Organizational Psychology Module 5, I/O Chapter 15, I/O Chapter 14, I/O Chapter 13, I/O Chapter 12, I/O Chapter 11, I/O Chapter 10, I/O Chapter 9, I/O Chapter 8, I/O C...

View Set

Vocabulary Workshop Level H Unit 1

View Set

Chapter 2 - Securities, Markets, and Transactions

View Set