Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

-What is the downtime per day for a system showing 99.9% availability?

1 minute and 26 seconds

-What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards?

100 Mbps (Fast Ethernet)

-Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

30

-You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?

62

-How many bits are used in a network with a subnet of 255.0.0.0?

8

-Jasper Infotech have an issue with their system-a host malfunctioning. They have hired you specifically to ensure that the system does not collapse when there is an unexpected hardware or software malfunction. Which of the following terms will you refer to while fixing this issue for Jasper Infotech?

Fault tolerance

-Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?

Incorrect VLAN assignment

-Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?

Incorrect port mode

-You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer?

Rollover cable

-As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Sequence Control

-The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario?

Trunking

-Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath?

UTP cable

-James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action?

shutdown

-As a network engineer, you have been tasked to form a Gigabit Ethernet for connecting a data center with a data closet in the same office building (<550m). Identify which of the following fiber Ethernet standards would you apply in this situation.

1000BASE-SX

-Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement?

100GBASE-T

-What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

14

-You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address?

192.168.50.118

-Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

2.4 GHz-2.4835 GHz

-What is the frequency range for Bluetooth communication?

2.4 GHz-2.4835 GHz

-Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

255.0.0.0

-You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

255.255.240.0

-You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.224

-Which of the following is a distinct network of storage devices that communicate directly with each other and with other portions of the network?

A SAN

-Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?

A layer 3 switch

-Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?

A load balancer

-Which of the following switches can be configured via a command-line interface or a web-based management GUI (graphical user interface)?

A managed switch

-Scott & Wayne Law Associates is a private law firm in Atlanta specializing in cases involving violation of environmental laws. The firm currently has approximately 50 employees who all work on various matters and in different departments. You have been hired as a network administrator and tasked with finding a suitable cloud model for the firm. The firm is looking for a comparatively low-cost cloud model that can be accessed only by the employees and senior management but not its clients or third parties. Which of the following cloud models would you choose?

A private cloud

-Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

-Analyze which of the following can be used to establish a static VLAN assignment for a device.

Assigning a VLAN based on the switch port the device is connected to

-In order to achieve the utmost fault tolerance, as a network administrator, you want to ensure that critical devices are all equipped with redundant NICs, routers, and processors, which are able to immediately assume the duties of an identical component in case one of the components fails. Which of the following will help you ensure these devices contain the necessary components you require?

Automatic failover

-Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time?

Bandwidth

-You have been working as the network administrator for JP Steels. In order to cut down on operating costs, you plan to install a firewall's OS (operating system) in a VM on an inexpensive server, instead of purchasing an expensive hardware firewall to protect a LAN. Hence, you no longer require a firewall that runs as a dedicated hardware device. Which of the following firewalls will you purchase in this scenario?

Barracuda's Cloudgen firewall software

-In which of the following modes will a vNIC access a physical network using the host machine's NIC but still obtain it's own IP address from the physical network's DHCP server?

Bridged mode

-You have been getting complaints about slow speed from one of your clients. You decide to visit the site to have a look, and you notice that the RJ-45 connector has been tampered with as a result of which there are network fluctuations. These fluctuations are taking place as the pins in the connectors are bent. Which of the following tools will you use to push the pins inside the RJ-45 connector?

Cable crimper

-While setting up a network segment, you want to check the functionality of a cable before putting connectors on them. You also want to measure the termination point or damage in the cable. Which of the following tools would you use to identify this?

Cable performance tester

-You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

Captive portal

-Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels.

DWDM

-Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

Data VLAN

-JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into it's own network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

Departmental boundaries

-Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

Diffraction

-Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?

EAP-TLS

-You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case?

FDM

-As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Fading

-Mr. Chadwick has recently set up a network connection for a client wherein he made a transition between an SMF and an MMF cable using a fusion splicer. Around a week later, the client calls him up and raises a concern about fluctuations in the network. Mr. Chadwick decides to conduct an on-site inspection, and he gets to know that the reason behind the fluctuation is that the transmission has not traversed successfully. Analyze which common fiber problem Mr. Chadwick is referring to in this case.

Fiber type mismatch

-Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario?

Five 9s

-You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

Four bits

-Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second?

Giga

-Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?

He should check whether captive portal user reminders have been set up.

-Mr. Haywire has just bought a set of wireless security cameras for his backyard. Howard, a network professional, has been sent by the store to set up the security cameras. While configuring and setting up the cameras, Howard notices that he is unable to configure the in-house Wi-Fi network with the cameras because of some frequency issues. Analyze what Howard should do in this situation.

He should set up an AP that offers a Wi-Fi standard on that band.

-Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

Hypervisor

-Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

IBSS

-You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

IBSS

-Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

Insufficient wireless coverage

-Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.

Interference seems to be the cause.

-In the formula 2n = Y, what does n represent?

It is the number of bits that must be switched from the host address to the network ID.

-The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here.

Jitter

-Josh is a new trainee at TT&P who has been sent to a client location to patch up cables connecting the switch to the data center. While doing so, Josh is unable to decide which connector to consider while connecting the ferrules of an SMF cable that measures 1.25 mm. Analyze and suggest which of the following connectors Josh should opt for under the circumstances so that there are minimum back reflections.

LC

-James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario.

Layer 4 switches

-Which of the following is not a characteristic of fiber cable?

Low cost

-Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

-You have been working with an ISP (Internet service provider) as a network engineer. You have made multiple WAN (wide area network) connections over a period of time. Recently, you have received complaints from various clients about network failure, which is having an effect on their day-to-day business. This network failure is primarily caused by some bugs in a few of the network devices. In order to protect your clientele, you have decided to provide an additional information sheet that will specifically state the amount of time you will take to fix the issue. Which of the following will you use to calculate the average amount of time required to repair the faulty device?

MTTR

-Which of the following can be used to provide administrative access to a switch?

Management VLAN

-Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?

Measured service

-As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable?

Media converter

-You are a network administrator, and you want to verify that a cable is properly conducting electricity so that its signal can travel unimpeded from one node on a network to another. Which of the following tools would you use to identify this while setting up the network segment?

Multimeter

-DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

-As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?

NIC teaming

-Which of the following VLANs receives all untagged frames from untagged ports?

Native VLAN

-Which of the following tools measures the amount of light power transmitted on a fiber-optic line?

OPM

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

PEAP

-As a developer, you need frequent access to multiple platforms during the development process. Rather than purchasing and maintaining a separate device for each platform, you have decided to avail the cloud service option. You are looking to build and test the applications within these virtual, online environments, which are tailored to the specific needs of the project. The cloud service model should have servers that provide only the resources needed to run an application and also allow customers to run their code directly in the cloud without having to manage a server environment at all. Which of the following cloud service models do you think would be appropriate considering your requirements?

PaaS

-Which of the following cloud models makes resources available to users through a private WAN connection?

Private cloud

-What is the service that offers a central authentication point for wireless, mobile, and remote users called?

Radius

-You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?

Rapid elasticity

-RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project?

SMF

-You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network?

Simplex

-What is the term used to identify the first four blocks that normally help to identify a network for IPv6?

Site prefix

-Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

Site survey

-Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?

Smart thermostat

-You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

Spectrum analyzer

-You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

Stack master

-Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

Static VLAN assignment

-An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario?

Switch spoofing

-You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

-Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots?

TDM

-The IT department at Zatar Airways has complained of a faulty copper cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected?

TDR

-You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network?

The core layer

-You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature?

The management plane

-Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

Trailer

-Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

VLSM

-You, as a network administrator, plan on running a trial for a beta version of an application. The idea is to install the application on a guest machine. You plan on doing this because you would rather have the untested software cause errors on the guest machine than on the host. Which of the following will you use in this instance?

VirtualBox

-Which of the following multiplexing technologies would you use with fiber-optic cable?

WDM

-Which of the following security threats involves an interception of the network keys communicated between clients and access points?

WPA attack

-Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

Wi-Fi analyzer

-Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

Wireless range extender

-Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

Wrong SSID

-Which of the following transceivers supports up to 10 Gbps (not more)?

XFP

-Blue Whale is an e-commerce website that has hired you as part of the network management team. The network administrator has delegated one of his tasks to you, which requires you to allow and configure more than one MAC address in one of the ports. Which of the following commands will help you complete the task at hand?

allowed-mac

-Subnetting, which alters the rules of classful IPv4 addressing, is known as

classless addressing

-Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations?

the infrastructure plane

-The part which identifies the network in an IPv4 address is known as

the network ID


Kaugnay na mga set ng pag-aaral

Small animal Midterm: Guinea Pigs and Rabbits

View Set

MAN3027- Lesson 11-Managing Human Resource Systems

View Set

CIS3003 Applications and Software

View Set

Chapter 12 Introduction to Business Test Review

View Set

Human Development Chapter 6 Study Guide

View Set