CNT-125 Final Review (Chapter 1-6)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

What is a centralized directory database that contains user account information and security for the entire group of computers?

Active Directory

Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

An MSA

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

An RFP

Which of the following statements stands true? 1.) FTP servers provide secure encryption for file transfer 2.) HTTPS is a secured protocol that provides secure transmission 3.)The DBMS does not support a multiuser environment 4.) An email can be downloaded to the client computer using POP3

An email can be downloaded to the client computer using POP3

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?

-80 dBm

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements.

.biz

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87?

10.43.3.87:23

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards?

100 Mbps (Fast Ethernet)

What is the maximum allowable distance for horizontal cabling?

100 m

Which of the following addresses can be identified as an APIPA address?

169.254.0.1

Identify the core of an RG-6 coaxial cable.

18 AWG

What is the frequency range for Bluetooth communication?

2.4 GHz-2.4835 GHz

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?

25

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 dB. What is the throughput that is being received at the moment as per your calculations, keeping the 3-dB rule in mind?

250 watts

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function?

3

Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

300871

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue.

5.925 GHz-7.125 GHz

The Mosiac Music School has hired Kirk to set up a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided?

5061

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation?

802.11ax

Identify which of the following statements is Correct. A 32-bit IPv4 address is organized into four groups of 8 bits each. The first part of an IPv address identifies the host, and the last part identifies the network. IPv4 is categorized into three classes. The approximate number of possible networks in class B IPv4 is 126.

A 32-bit IPv4 address is organized into four groups of 8 bits each.

Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario?

A combo device

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?

CAN

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered?

CAN

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

CNAME Record

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

Captive Portal

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Cat 6a

Mr. Furland was hired as a network engineer at Secret Eye Corporations that is running a security camera outlet. While setting up a camera at one of the sites, he notices that the security camera has been mounted really high as a result of which there are no power receptacles to power up the device. So, Mr. Furland plans on powering these devices using an Ethernet cable. Which category of cable should he choose to power up the device?

Cat 7

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario?

Cat 7

You are working as a network administrator for an ISP. You receive a complaint about fluctuations in the network speed despite using a fiber-optic cable. On checking the situation, you are of the opinion that you will need to cut a clean slice through the fiber strands. Which of the following kits should you carry for this purpose?

Fiber cleaver

Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

GRE

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second?

Giga

Which of the following is an example of an industrial controls system?

HVAC

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation?

He should use IMAP4 to deliver the message.

Which of the following cabling methods connects workstations to the closest data rooms?

Horizontal Cabling

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?

apt-get install dnsutils

As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action?

arp -d

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?

sudo hostname

As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?

Padding

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

Patch Cable

As a senior network engineer, which of the following would you use when you are setting up a network connection at a university and you have to connect and organize lines running from walls to racks to network devices?

Patch panels

Which of the following cables comes coated with a flame-resistant jacket?

Plenum cable

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario?

Plenum-rated cable

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?

Port 22

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

Port 3389

What may cause smaller companies to opt to use a desktop operating system over a network operating system?

Price

You are a network technician who, on inspection, has found that one of the cables is faulty as a result of which you now have to insert a new piece of twisted pair into the data receptors to complete the circuit. Which of the following will you apply to sort this issue?

Punchdown tool

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

RADIUS

You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand?

RAID

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.

Router

Tim has been contracted to install a wireless connection at the head office of Travis Roadways. The head office is located in between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI (received signal strength indicator) level required for Tim to establish the connection functional as per the requirements.

The RSSI level should at least be -50 dBm

Hill Corporation Ltd., an Internet service provider, has been providing networking solutions to Riverdale High School for over a year. However, recently the administration at Riverdale high School has been complaining of an unstable connection. You are employed by Hill Corporation for the purpose of inspecting the issue at hand. What would be your first check point to ensure that there are no network issues from the service provider's end?

The entrance facility

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network?

UDP

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?

UDP

Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath?

UTP

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath?

UTP cable

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Unicast address

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should harry do in such a situation?

Use POP3 to deliver the message

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?

Use a top-to-bottom OSI layers approach

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use geofencing security technique

Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances.

Use the EAP_TLS encryption to protect communicatoins

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

VPN

What should be the ideal procedure after implementing the solution to a network troubleshooting problem?

Verify functionality and implement preventive measures.

Which of the following is a component of backbone cabling that runs between building floors?

Vertical cross connect

Which of the following multiplexing technologies would you use with fiber-optic cable?

WDM

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

WPS attack

Which of the following client-server applications use Apache and Nginx?

Web Service

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

Well-known ports

Which of the following transceivers supports up to 10 Gbps?

XFP

You are a junior technician at KVM Solutions. They have just received a query from a university who wants their network connection to be set up. You have been tasked with sketching a diagram for the various network devices that will be used to establish the connection. Which of the following options would you apply to identify the routers in that connection?

A hockey-puck shape with two arrows pointing inward and two pointing outward

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

A more negative RSSI value indicates a higher quality of signal

What is a graphical representation of network devices and connections known as?

A network diagram

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?

A network operating system is much more expensive than a desktop operating system.

Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack?

A rack diagram

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.

A star topology

Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario?

A star topology

The process of designing, implementing, and maintaining an entire network is called _____.

A system life cycle

A client who has a small office setup has complained about a faulty wired connection in their LAN as a result of which they are unable to use the broadband service to access the Internet. You, as a network technician, have to solve the matter. Which of the following will you need to access the situation?

A wiring diagram

Which one of the following DNS record types holds the name-to-address mapping for IPv6 addresses?

AAAA Records

Which of the following terms is also referred to as a "network of networks"?

Backbone

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand?

Backbone cabling

Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time?

Bandwidth

Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario?

Barney should use VDI (Virtual Desktop Infrastructure)

PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional. Which of the following statements should Suleiman consider while considering a change in a network?

Change management procedures should consist of preparing a backup plan as well.

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Checksum

The University of Philadelphia wants you to format an IPv4 address through which the dean of the university wants to go on a videoconference with the teaching staff about certain educational norms which they plan on implementing. Which of the following classes of classful addressing will you apply to deliver the requirement?

Class D

What should you do once you have tested your theory to determine the cause of the problem at hand? a. Establish a plan for resolving the problem. b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes.

Correct. Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data.

A Client has hired you to help with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers?

CuteFTP

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers?

CuteFTP

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels.

DWDM

What is a small file containing verified users' identification information and public key known as?

Digital Certificate

What is the logical group of Windows Servers controlling the network access to a group of computers also known by?

Domain

Silicone Printers has raised a ticket claiming that it was unable to view websites from its workstations, because with every attempted access, the system displayed an error message that read "there is another device using the same IP address." What would you, as a network engineer, check for in such a scenario?

Duplicate IP addresses

Which of the following ports range from 49152 to 65535 and are open for use without restriction?

Dynamic and Private Ports

Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?

EAP-TLS

You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?

ESP

Mr. Walker plans on manufacturing a new line of twisted-pair cables for Ethernet Networks. To do so and to compete with the other brands circulating in the market, he has to get his cable qualified as per certain standards. Which of the following points should he emphasize to get his cable TIA/EIA certified?

Effective throughput

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

Ethernet

The University of Mordor houses almost 1000 students in its campus. It has multiple buildings in the campus where free food and Internet services are provided for the students. The University boasts of providing one of the fastest Internet experiences in the country and there have never been any reports of the service going down. To ensure such efficient connectivity, the University adheres to the ANSI/TIA standards to better manage the data feed from the main data facilities. Which of the following can be reasonably inferred from the above scenario?

Every floor in the building has an individual IDF

You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case?

FDM

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?

FTPS

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Fading

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

IBSS

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

IBSS

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network?

ICMP

Royal Global University has just set up a new department for biotechnology and has hired you to extend the network connection to this department. Which of the following equipment do you think is necessary while extending the connection?

IDF

BitBakers is a small start-up selling local bakery items in Kansas. It has its organizational back end running from a small LAN setup. Recently, it received funding for its products to be sold on a larger scale. As a result of this funding, the firm has contracted Kevin to boost up its network strength so that it can traverse to more than one LAN segment. Analyze which of the following protocols he should apply in this scenario.

IP

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?

IPsec

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Identify why the application is behaving in this manner and the symptoms behind such behavior.

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing?

Incorrect DNS

As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water?

Install cable through conduits

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be.

It will increase the possibility of transmission interference between wires.

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?

Knowledge Base

Josh is a new trainee at TT&P who has been sent to a client location to patch up cables connecting the switch to the data center. While doing so, Josh is unable to decide which connector to consider while connecting the ferrules of an SMF cable that measures 1.25 mm. Analyze and suggest which of the following connectors Josh should opt for under the circumstances so that there are minimum back reflections.

LC

Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload?

Layer 4

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination.

MAC Address

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation?

Mac

Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver's end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client's device's RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario.

Mark the rating as not good

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable?

Media converter

Which DBMS applications would you use if you were to organize data into tables and records?

Microsoft SQL Server

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

Multicast address

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

Larry is a senior technician who has to document the recent troubleshoot he carried out at Kroger Industries related to the baseline configuration of network devices. Larry is still unsure as to what category type he should document the troubleshoot so that it falls under standard operating procedures. Analyze which of the following category types Larry should opt for in such a scenario.

Network Configuration

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

Network Layer

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?

OFDMA

Which of the following tools measures the amount of light power transmitted on a fiber-optic line?

OPM

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved.

Open up port 1433

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation.

Order switches that allow upgradeable interfaces

Britain Airways has complained of a faulty NIC as a result of which they are having connectivity issues within the organization. You, as a senior technician, want to find out the manufacturer of the NIC so that you can submit a report of constant bugs in their device. Which of the following addresses will help you to identify the manufacturer of the NIC?

Organizationally Unique Identifier

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

Out-of-band management

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

PEAP

What protocol is used to download an email to a client's computer?

POP3

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you yo ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employee can have secured remote access to the computer server?

RDP

Which protocol would you apply so that the employees of a client can have secured remote access to the computer server?

RDP

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

Resolvers

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.

Roll out changes in stages

You have been hired to implement a major change in the financial software used by the accountants at a fast-food chain. On implementation, you notice that the devices are not compatible with the upgrade and have started showing errors, as a result of which the organization is unable to function. What would you do in such a situation?

Rollback

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer?

Rollover Cable

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

Router

Which of the following consists of high capacity data storage devices in a distinctly defined network segment?

SAN

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them?

SDS

Which protocol is used to send an email message to the first server?

SMTP

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case?

SSH

Which of the following is a collection of protocols that performs both authentication and encryption?

SSH

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Sequence Control

What is applicable to a peer-to-peer network and not for a client-server network model?

Simple to configure

You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network?

Simplex

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

Site Survey

Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?

Smart thermostat

Sphinx Infra Ltd. has doubts on how to meet the various privacy, security, and safety precautions installed for their network. You have been hired to analyze the existing modules for which you will need to go through the network documentation before suggesting any change. Which segment in the network document will contain the necessary information you require?

Special instructions

Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?

Split tunnel VPN

Which of the following server racks would you use for a bolt-free mounting?

Square-hole racks

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots?

TDM

The IT department at Zatar Airways has complained of a faulty fiber-optic cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected?

TDR

Which of the following protocols transfers files without any authentication or security?

TFTP

Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?

Terminal Emulation

Which of the following remote access methods allows a remote client to take over and command a host computer?

Terminal Emulation

Which of the following is the third step in a network troubleshooting methodology?

Test your theory to determine the cause

As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?

The implementation phase

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

The network layer

You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books?

The total number of computers functioning in the organization

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model?

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

What is help desk software used for?

To document problems and their resolutions

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

Trailer

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

Transmission Control Protocol

Which of the following hostname commands resolves a device's hostname with its IP address on the network?

hostname -I

JHS Mediaworks has contacted you to troubleshoot some TCP/IP errors on some workstations within the organization. On inspection, you get to know that the workstations functioning on Windows are all stable and the ones running on UNIX and Linux systems are the ones that need troubleshooting. Which of the following command-line tools will you use in such a scenario to view and manage the TCP/IP settings?

ip

Which command displays the full list of available objects and commands?

ip help

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

ipconfig

Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company's data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation.

mGRE

Which of the following utilities would you use to display TCP/IP components and connections on a host?

netstat

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running?

ping 127.0.0.1

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful.

ping 8.8.8.8


Kaugnay na mga set ng pag-aaral

Вторая мировая война

View Set