MSIS 4523 Test 3 Demo Questions
A 24-character key is used in which type of wireless encryption schere?
104/128-bit WEP 104/128-bit WEP - The question is actually incorrect, but you may see it this way on the real test. 104/128-bit WEP uses a 24-character key. At 4 bits per character, 24 characters yields 104 bits. However, there is a 24 bit initialization vector, which creates 128-bit encryption. 40/64-bit WEP uses a 10-character key WPA and WPA2 use between 8 and 63 characters
A network administrator is performing a site survey and detects an existing 802.11g signal on channel 5. WHich ofthe following channels would be the LEAST likely to interfere with the existing signal?
11 11 - The farther away that two frequencies are from each other, the lower the chances that they will interfere with one another. Channels 1, 6, and 9 are all closer to channel 5 than channel 11
The most common maximum distance for both ISDN and DSL lines between the user and the central switch is
18,000 feet Both ISDN and DSL share the same maximum distance of 18,000 feet from the user to the central switch
You are creating a wireless network infrastructure for your company. You have three 802.11g WAPs to install. You decide to install them all within 50 meters of each other and set the channel to 1. After you finish the installation, what will the theoretical bandwidth of your network be?
54 Mbps 11 Mbps is the speed of 802.11b 162 Mbps makes you think your bandwidth will triple 100 Mbps is the transmission speed of 100BaseTX, otherwise known as Fast Ethernet
What is the usual number of bits for the host identifier portion of an IPv6 address?
64 IPv6 is 128 bits in length. The first half identifies the network, while the last 64 bits identify the host
The term virtual switch would best be described as which of the following?
A logical, rather than a physical, switch used to connect devices on a network A virtual switch is the same as a physical switch. The only difference is, now, we need to think in terms of a physical switch versus a logical (virtual) switch. Switching your entire network to a virtual environment sounds like a bold move. A physical device that holds and runs simultaneous operating systems is a virtual machine or virtual server. A form of cloud computing that routes telephone numbers is a virtual PBX
What can a network administrator configure to control specific IP addresses and ports access to the internal network? (Select two)
ACLs Firewall Access control lists and Firewalls- both of these can be configured to allow/restrict specific ports or IP addresses from accessing the network. MAC filtering and switches are at layer 2 IIS is for hosting Web pages, and a port scanner is for detecting open ports for security purposes
Where would a patch antenna for 802.11 usually be placed?
Against a wall Patch antennas generate a half-spherical signal, making them perfect for use against a wall
Tammy knows that WEP keys come in two lengths: 64-bit and 128-bit. However, when working with a WAP, she only sees options for 40-bit and 104-but, WHat's happening?
All WEP keys include a 24-bit initialization for Vector and the WEP manufacturer chose not to include that All WEP keys include a 24-bit initialization Vector and some WEP manufacturers choose to represent the 64-bit as 40-bit and the 128-bit as 104-bit
An 802.11g wireless access point has the following configuration: -AP encryption forced to WPA2-AES mode only -MAC address filtering enabled with the following MAD address in the allow list: 00-a1-29-da-d3-4a Which is true about the above configuration?
An 802.11n compatible client can connect to the wireless network only if its MAC address is 00-a1-29-da-d3-4a and the encryption key is known by the client. 802.11n is backwards-compatible with 802.11g networks TKIP is not the same as AES, wo it would not work Because MAC filtering is enable, the client's NIC must have the right MAC address 802.11a and 802.11g aren't compatible with one another
802.1x is used for?
Authentication The IEEE 802.1x standard is for authentication, mainly in wireless networks.
Casey is a new technician. He is monitoring network bandwidth and notes that the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?
Baseline A baseline is a document that provides an image of a network operating under normal conditions Network maps give layout and configuration information Cable management documentation shows where the cables and drops are Wire schemes determine which colors are used at which pins
What is the quickest and easiest technology available to keep servers and equipment up and running?
Battery backup/UPS A battery backup/UPS on each rack or critical node keeps systems up and running in the event of power failure. RAID arrays are great to keep things running, but if the power goes out, they are not available. A disaster-recovery plan is for dealing with a situation where the system is already down. A business-continuity plan is for dealing with a situation where the system is already down.
Identify specific threats to Bluetooth-enabled devices (select two)
Bluesnarfing Bluejacking Bluejacking is when a Bluetooth node sends unsolicited messages to nearby Bluetooth-enabled devices. Blue snarfing is unauthorized access to data on a Bluetooth-enabled device. WHile there are such things as smurf attacks, they are not a specific Bluetooth threat. Bluesyncing is a made-up term.
Which other common wireless technology can interfere with 802.11g signals?
Bluetooth Bluetooth - Bluetooth operates at 2.4 GHz, just like 802.11g, which can cause interference. RADAR is way too broad an answer to be correct. 802.11a operates in the 5-GHz frequency, so it doesn't interfere. IrDA is infrared and wouldn't interfere with 802.11g.
Which choice is an economic approach to enable a home user with a single desktop computer to have Internet access throughout the house?
Broadband over powerline Broadband over powerline - Using a broadband connection distributed over the already existing power lines means the home user does not have to a=buy new cables or a new Wi-Fi router. No matter where he plugs in the system, he will also be plugged into the broadband connection. Cat 5, 6, and fiber optic cables would require the user to purchase cables, connectors, and switches to connect each room
Which selection is a multiplexing technology in WEN environments that combines multiple data streams onto a single fiber optic cable?
CWDM Course Wavelength Division Multiplexing (CWDM) combines multiple data streams onto a single fiber optic cable by modulating different wavelengths of laser light. Multilink PPP enables a computer to use two or more PPP connections in a combined fashion to achieve greater bandwidth. Edge is a wireless data transmission technology. OC-12 is a high-speed wireless backbone, but it's not a multiplexing technology.
A customer with a SOHO requires fast, secure, cost-effective access to the INternet. Which of the following would be the MOST appropriate solution? (Select two)
Cable modem with a separate firewall DSL modem with firewall capabilities Cable modems and DSL modems are both reasonable priced for service compared to DS3 or OC3 DS3 and OC3 with firewalls are both fast and secure but not very cost-effective. DIal-up is very slow.
A user is using a PKI authentication method. Which of the following will the user need to implement PKI?
Certificate services Certificate Services - Public Key Infrastructure (PKI) is a methodology for using various pieces to manage and distribute certificates Router commands, ACLs, and a RADIUS server do not use PKI to perform their functions
Shelly has several users that are complaining about someone tampering with their computers. She knows that their passwords are not very secure and are easy to guess. She explains the recommended password practices. Which of the following statements should she include in her recommendations?
Change your password every 30 days at least Use a password with a combination of upper and lower cast, numbers, and special symbols. Use a password length of at least 8 characters The first thing people try when they want to crack your password is your family member's names and pet names. The other thing people will do is look around your desk area for notes that would lead to a possible password.
How should you configure multiple 802.11g wireless access points to create a single network that enables users to roam freely?
Configure all the WAPs to use the same SSID Although somewhat problematic in practice, the way to set up a Wi-Fi netowrk that enables seamless routing is to use the same SSID and security settings, but change the channel (and thus frequency). Using different channels, such as 1, 6, and 11 avoids any potential radio frequency interference (RFI).
Which technology enables data to be transported over wiring that carries able television signals?
DOCSIS DOCSIS: Data Over Cable Service Interface Specification IEEE 1901 standardizes the transmission of data over home electrical wiring EIA 568B is an RJ-45 wiring specification Ethernet over HDMI supports Ethernet over HDMI interconnecting cables
What is the name for the point where an IPS's responsibility for an Internet connection ends?
Demarc The demarc is the technical and legal point at which a service provider is no longer responsible for a connected service An ISP's responsibility for an Internet connection ends before a router, MDF, or IDF
Which term describes the rate at which usable information bits are delivered from one node to a destination?
Goodput Goodput discounts all protocol overhead, acknowledgements, and retransmissions, counting only the useful bits successfully delivered over a given time. Throughput includes information, protocol overhead, and other bits that are extraneous to application information. It is measured bi-directionally so it also includes the delay between acknowledgments and next transmissions. Baud rate is the number of signal cycles per second. THis term is used with modern connections. Bit rate is the raw number of bits transmitted in a single direction and includes all overhead and non-information bits
An Application Layer (LAyer 7) firewall, such as a proxy server, can filter what kind of traffic that a Network Layer (Layer 3) firewall cannot filter?
HTTP URLs Application Layer (Layer 7) firewalls, such as proxy servers, can filter traffic based on all sorts of stuff, including HTTP URLs. This enables you to set up a network and simply not allow traffic from specific Web sites.
Sam is setting up two pieces of networking equipment that are identical. He can use them in conjunction for what purpose? (Select two)
High availability Fault tolerance The reason I would want two pieces of equipment working together would be to keep the network up and running in case one of those devices failed, providing fault tolerance as well as high availability when the network may be overloaded with requests. Having more equipment won't help with latency. That's an issue I'll have to take up with my ISP. Or if it's internal, I would need to upgrade my network medium. Don't use satellite if you can help it! Common Address Redundancy Protocol (CARP) is a protocol used to allow multiple hosts on the same network to share a set of IP addresses. This provides your network with redundancy. Remember, the question is asking for the "purpose"; CARP is a protocol, not a purpose Bandwidth shaping is a function of an advanced device such as a router to control how network bandwidth is used.
Which technique would be used to test the network security of a particular network by allowing it to accept security attacks?
Honeynet A Honeynet draws in attackers so their methods and location can be determined and subsequently protected against without jeopardizing vital information A honeypot is a single machine Vulnerability scanners and IDS are very helpful, but you don't want them to "receive security attacks"
Several switches are being configured by a network technician so they can be remotely managed. Which switch element must be configured to support SSH connections to each device, as well as to retrieve various parameters?
IP address and SNMP configuration IP and SNMP - To connect to anything on an Ethernet network, both devices need IP addresses. SNMP enables, among other things, the ability to remotely manage SNMP enable devices PoE is Power over Ethernet, and QoS is Quality of Service. Neither of these would enable you to remotely manage a switch. VTP stands for VLAN trunking protocol. Since there is no mention of VLANs or trunking between VLANs, this is most likely NOT the answer
Which of the following is true regarding IPv6?
IPv6 and IPv4 can exist on the same network IPv6 and IPv4 can exist on the same network. It's happening right now if you are using Windows 7! IPv6 supports addresses up to 128 bits in length IPv6 is not the only type of addressing that can be used on modern network. You can run IPv4 just as easily. The first 64 bits of an IPv6 address are known as the network prefix. The second 64 bits are known as the EUI-64
Which technology provides a Cloud-based computer that can be scaled-up as necessary, providing additional network capability, memory, CPUs, and storage?
IaaS Infrastructure as a Service (IaaS) provides Cloud-based, scalable, virtualized hardware on which to run web apps and other services Software as a Service (SaaS) provides a system for delivery and licensing of software on a subscription basis Platform as a Service (PaaS) is a Cloud-based service solution consisting of virtualized computers and software/application development tools A storage area network (SAN) is a network that contains and provides block-level data storage
You have only one switch but you want it to support two separate network segments. What should you do to accomplish this?
Implement VLANs on the switch Implementing Virtual LANs (VLANs) would accomplish this. VLANs are a special type of switch that gives you the option of creating multiple network segments. SMTP is for mail, QoS (Quality of Service) allows you to give priority to certain types of network traffic, and SNMP allows, among other things, remote control, information of devices
Maria needs to install a server for a bank where up-time is a necessity. What could she do to add fault tolerance to the servers' network connections?
Install two NICs for bonding Although switching from copper to fiber would increase fault tolerance (assuming she wasn't already using fiber), installing two NICs and using bonding (a.k.a teaming or link aggregation) would provide excellent fault tolerance. It would also speed up performance, although that would be a side effect for Maria's purposes.
Which technology improves Ethernet data-transmission speed over a network?
Jumbo frames Jumbo frames enable more data to be sent over a network by requiring less overhead and fewer acknowledgements ISCSI is a communication protocol that allows SCSI storage-control commands to be sent across a network network-attached storage is a method of providing network-accessible file storage space Virtual Network Interface Cards are software-defined interfaces that exist within a virtual machine.
What is the NTP protocol used for?
Keeping clock on a network synchronized The Network Time Protocol or NTP is used to synchronize the clocks on computers on a network
TCP/UDP port 88 is the default for which of the following services?
Kerberos Kerberos is used for network security and utilizes port 88 LDAP uses port 389 IGMP is a protocol for multicasting information, and therefore doesn't have a port number HTTP uses either port 80 or 8080
Which of the following standards is used by Windows for client authentication?
Kerberos Windows uses the famous Kerberos authentication standard
Which standard is commonly used to control thin-client wireless access points?
LWAPP Light Weight Access Point Protocol (LWAPP) is the most common protocol to control thin-client wireless access points Wi-Fi is a trademarked term to describe 802.1x wireless networking 802.11n is a Wi-Fi signaling standard Multiple In, Multiple Out (MIMO) is a way to use multiple antennas on a WAP to achieve maximum bandwidth utilization
A specialized device that you install on your network to distribute network requests and ensure availability to all your users is an example of which type of network management techniques?
Load balancing A device that allows you to distribute the load on your netowrk is a load balancer. Port mirroring is a method by which one or more ports on a switch are mirrored to another. It is used a lot in packet sniffing. Port address translation (PAT) is the most popular variation of implementation of NAT. Quality of Service (QoS) is a technology that allows you to determine which network services get higher priority.
Which document is used when a formal contract for services is not appropriate?
Memorandum of understanding A memorandum of understanding is used when a formal contract is not appropriate A service-level agreement is a formal contract A statement of work is a formal agreement An acceptable-use policy governs network-usage policies
Which appliances will most likely cause interference in an 802.11g network? (Select two)
Microwave oven Cordless phone Many cordless phones and microwaves today utilize the 2.4 GHz frequency range which is the same range as 802.11b and 802.11g. THis can create interference on you Wi-Fi network Electric can openers, satellite TV, and fluorescent lights are good to go!
What is the benefit of using PoE+ (802.3at) over using PoE (802.3af)?
More power Original PoE supplied about 15 watts of DC power while PoE+ supplies over 25 watts PoE and PoE+ have nothing to do with speed PoE and PoE+ have nothing to do with VLANs PoE and PoE+ have nothing to do with NICs
What should 802.11n clients use to achieve MAXIMUM bandwidth throughput?
Only the 5-GHz band Only the 5-GHz band - More bits can be modulated onto high frequency carriers that low frequency carriers. Using lower frequencies limits the amount of data that they can carry.
An organization needs to install a WAP in a warehouse where a power outlet is not readily available. The network technician can configure a port on a switch that will provide both connectivity and electrical support to the WAP. What needs to be configured in the switch?
PoE PoE- Power over Ethernet enable data signals as well as power on Ethernet cables for PoE devices STP is to prevent broadcast storms on switches VTP trunking is for trunking VLANs Prot forwarding does not provide electrical support for devices
An IT manager needs a new switch to support VoIP phones and wireless access points in a new building. Which of the following features should be included in the new switch?
PoE and QoS PoE and QoS - Power over Ethernet means the phones get power as long as they're connected to the network, and Quality of Service means they have the necessary bandwidth for communications. LACP and OSPF have nothing to do with VoIP 802.11X deals with network access control 802.11n is a Wi-Fi standard NAT and VTP deal with IP address translation and VLANs
Firewall are defined by which three basic technologies? (Choose two)
Port Blocking Packet Filtering To increase security, firewalls are usually configured for port blocking, packet filtering, and network address translation (NAT), among other security technologies Dynamic Routing is not a function of a firewall
What does posture assessment do?
Posture assessment is a Cisco process that queries a host to see if it meets certain security criteria Posture assessment queries a host to identify minimum security requirements before allowing it to connect to the network. Posture assessment has nothing to do with human posture Posture assessment is unrelated to chiropractic practices Posture assessment is not performed on humans, before or after an injury
What network device enables all of the network nodes to hide behind a single, public IP address?
Proxy server The proxy server goes out on the internet for me, therefore I don't need and IP. The proxy already has one. Layer 3 switches are still just switches and don't "hide" anything Content filters are typically used with proxy servers, but they don't "hide" anything either VPN servers are for creating an encrypted connection between nodes or networks, but that doesn't sound like what we're doing here.
Why is it important to isolate a SCADA or ICS system from the other corporate networks?
SCADA networks should be isolated to reduce security threats to the production line. There are different threats to a SCADA netowrk than to an IT data netowrk. Isolating them from one another reduces the chance of malware migration. There is little chance that combining data networks with SCADA networks in a well-designed network environment would cause a traffic overload to either. Modern implementations of SCADA and ICS use TCP/IP traffic, making it compatible with any IP network. Network loggers have no trouble working with SCADA networks, data networks, or both.
June needs to copy a file from one server to another securely. What protocol should she use? (Select two)
SCP SFTP Both Secure Copy Protocol (SCP) and Secure FIle Transfer Protocol (SFTP) would enable her to copy a file securely. The venerable File Transfer Protocol (FTP) transfers usernames and passwords in clear text, so offers little security. Simple Network MAnagement PRotocol (SNMP) doesn't do files. Point-to-Point Tunneling Protocol (PPTP) is an encrypted authentication protocol used in VPNs.
Which options represent common hashing techniques? (Select two)
SHA MD5 MD5 and the various iterations of SHA are hashing techniques PAP is a clear-text password authentication protocol SFTP the secure file transfer protocol SNMP is the simple network management protocol
What protocol would enable Jill, the administrator of the Bayland Widget Corporation's network, to monitor her routers remotely?
SNMP The Simple Network Management Protocol (SNMP) enables you to collect information from SNMP-capable devices. The protocol provides the capability to change things on remote devices, though the usual implementations seem a bit more passive.
A network technician needs to check the configuration of a port on a switch. Which tool is he MOST likely to use to verify the configuration?
SNMP monitor SNMP - The simple network messaging protocol is used to, among other things, remotely administer SNMP-enabled devices Traceroute tells you what routers your packets are passing through on their way to a destination Nbstat is only used in NetBIOS/netbeui networks, and dig is a DNS query tool
A technician has been assigned to set up network monitoring for some important network devices. Due to the sensitive nature of the devices, the information must be sent in a secure fashion to the monitoring station. Which protocol will facilitate monitoring and support secure transmission of the data?
SNMP v2 SNMP v2 added, among other things, encryption SYSLOG is used for system analysis SMTP is used for mail traffic VPN is not a protocol
You're looking into setting up a VPN connection at your offices and you want the VPN to operate at the highest layer of the OSI model. Which protocol would allow this?
SSL SSL/TLS works at the Application Level Layer (Layer 7), the highest layer in the OSI model L2TP and PPTP are both used for VPNs and work at the Data Link Layer (Layer 2) IPSec is another encryption method used, but this method works at the Network Layer (Layer 3) of the OSI model
The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?
Senior management and IT management should identify critical assets and critical nodes. Critical assets and nodes represent single failure points. In is the job of IT management and senior management to determine which elements are critical. Not every server may be a critical node. Drives that are not critical nodes are assets that don't necessarily need to be in a RAID array. Critical drives should be backed up, but not every drive is critical.
Good ground provides protection against which threats?
Short circuits ESD Static Short circuits, ESD, and static are electrical problems that can be reduced or limited with good grounding High voltage is not necessarily protected against by good grounding; sometimes a system requires high voltage Fail-open is not an electrical condition, it is the state of a door lock after a power failure
Which networking device enables you to troubleshoot remotely using a loopback?
Smart jack A smart jack or network interface unit (NUI) enables remote loopback testing
You have just entered you MDF and are about to do a major upgrade on your netowrk. In order to do so, you need to cut 100 pairs o wire in half. What tool will you use to do this?
Snips Snips will allow you to cut through all those wires. Cable strippers are used to string the PVC or Plenum coating from the cable. Punch down tools are used to punch the cable into a 66 or 110 block. Crimpers are used to crimp down an RJ-45 connector to the cable.
Having the proper security policies and adequate training for employees protects your netowrk from which of the following?
Social Engineering Proper policies and training can mitigate social engineering because employees will be wise to such tricks.
An accountant for a large corporation receives a call from an individual claiming to be John, a network technician in HQ. John tells the accountant that they have been having some problems with the active directory for a few employees and her account is one of the accounts experiencing problems. John then asks for her username and password so that he can resolve the problem with the account. What is this scenario an example of?
Social Engineering This is a common social engineering scenario. WIth social engineering, the attacker will try to get the potential victim to give them private or secret information
Which of the following is an example of a firewall that check all incomeing traffic, then decides if the traffic should be allowed through or dumped?
Stateful inspection Stateful inspection is a complete inspection of a packet from its source through to its destination to confirm an authenticated conversation. Packet sniffing captures packets to be examined later Packet filtering restricts packets based on IP addresses Content filtering restricts access to sites based on words or images that are on that site
Some switches can have more than one VLAN assigned to a single port. What kind of VLANs are these?
Tagged VLAN A tagged VLAN has more than one VLAN assigned to a given switch port (known as a trunk port in CIsco parlance). Data is delivered to the correct VLAN based on information - known as the VLAN tag - embedded in the frame header. The default VLAN is an unchangeable VLAN within a switch. It can be used standalone or in support of additionally created tagged and untagged VLANs. A native VLAN is a single, untagged VLAN that is assigned to a switch port that also has tagged VLANs assigned to that port. THe native VLAN handles any untagged traffic that may enter the port and is used to support other internal VLAN functions. An untagged VLAN can only have a single VLAN assigned to a given port on the switch. Any host connected to the port is assigned to that particular VLAN.
A wireless network is secured with WPA2 Enterprise. Clients are unable to connect to the network. What is the MOST likely explanation for this problem?
The RADIUS server is down The RADIUS server is down - Enterprise authentication requires a local password and a server to provide the enterprise password. MAC addresses don't change It is unlikely that all uses are using incorrect passwords PSK is personal, not enterprise, so that has nothing to do with this scenario
How can a single NIC in a server transmit packets from multiple different source MAC addresses?
The server contains several virtual machines and the MAC addresses are from the virtual machines The server contains virtual machines; when creating a virtual machine (VM), you can either use the existing NIC or create a virtual NIC with a virtual MAC address NICs don't re-transmit another machine's MAC address, only their own, so hosting a Web server or proxy makes no difference.
An organization has decided to upgrade wireless security by switching from WEP encryption to WPA2. Each WAP has been set to the new encryption standard and users are given the new passwords. Most users can connect using the new authentication, but some users report that they cannot connect. Which fo the following is the MOST likely cause of the problem?
The users who cannot connect are using older NICs without WPA2 support. The users who cannot connect are using older NICs without WPA2 support. Some older devices do not support newer encryption standards and technologies. Users who were in range previously would not be out of range because of an encryption change. There was no change to the VLAN configuration or the signal strength.
A home user is experiencing performance issues with her wireless network. She has checked the following issues: -Checked to make sure the laptop is withing the appropriate wireless network range -Checked the connected SSID and wireless channel -Checked that the laptop is the only device connected to the wireless network Which is the MOST likely cause for the performance issues?
There are other wireless devices in the area that operate on the wireless band and on the same wireless channel The user's WAP may be on the right channel, but if other WAPs are on the same channel, their signals can interfere with each other, causing slowdowns for everyone. The user is the only one connected to the WAP, so it is not overloaded by someone else watching videos A wrong TKIP password would prevent a connection, not poor performance IP addresses won't affect performance
The best (most secure) passwords have which of the following characteristics?
They should include a combination of letters and numbers They should not be common words from the dictionary They should not be based on easily-determined personal information such as the names of spouses and children
A chain-of-custody document includes what information? (Select three)
To whom was evidence passed and when What was taken into custody When was evidence taken into custody Chain of custody is concerned with tracking evidence to avoid loss or tampering. It documents what evidence was taken into custody, when it was collected, and who was it passed on to. Names and ages of someone accused are not part of the evidence being tracked in a chain of custody document.
What device helps you locate and identify cables?
Toner Toners consist of a tone generator and a tone probe, which together help identify cables. The tone generator sends a tone through the cable, and the tone probe receives the tone, allowing you to trace out the cable to the opposite end A TDR is used to determine the length of the cable A continuity tester only verifies that a cable has no breaks in it Protocol analyzers collect and analyze individual packets
What can a technician use to identify punch block terminations if the wiring diagram has been misplaced?
Toner probe Toner probe - One part of the probe generates a signal on the wire, and the closer you move the probe to the correct wire, the stronger the tone. TDR and OTDR are used for determining (among other things) if you have a break in the wire/cable. A protocol analyzer helps with network management.
Users are reporting slow Internet connection speeds. Network technician Zim suspects that users are streaming video and music. Which of the following would BEST confirm Zim's theory?
Traffic analysis Traffic analysis shows the type and quantity of data passing on a network SNMP supports the management of devices History logs don't exist System logs show boot up processes
The traffic from multiplie VLANs need to be combined and sent to a single port. Lulu Belle, a network administrator, need to configure the VLANs to enable this. Which of the following configuration changes would Lulu Belle need to adjust?
Trunking Trunking combines traffic from different VLANs Traffic and MAC filtering would have the opposite effect of what Lulu Belle needs to do Port mirroring only duplicates traffic from another port, but it does not combine data streams from different VLANs
Which technology encompasses video conferencing, real-time video, fax, messaging, and collaborate/workflow tools?
Unified communication technology Unified communication technology combines and manages a collection of otherwise independent communications tasks Medianets are optimized iterations of video teleconferencing (VTC) but this is only one small aspect of unified communications technology VoIP is just one of many aspects of UCT Border Gateway Protocol (BGP) is a large-scale routing protocol that is not directly related to unified communications
Which choice is a self-contained VoIP solution, implemented in the Cloud, that provides a PSTN connection to a client station?
Unified voice services Unified voice services are implemented in the Cloud and require only speakers and a microphone on the client end to provide VoIP services to the client. Web services provide many more solutions than VoIP. SIP and MGCP are VoIP call-setup protocols.
An Ethernet network, using only switches, is slowing down as more computers and switches are added. What could be done to alleviate this?
Use a VLAN We need to break this network into smaller broadcast domains. Of the choices given, only VLANs would segment the network into smaller broadcast domains.
Senior technician Klaus has installed a new WAP. Users are able to connect to it, but they cannot access the Internet. What is the MOST likely cause of the problem?
Users have specified the wrong encryption type and routes are being rejected Wrong encryption type - The initial connection to the WAP is actually done in the clear, so you can "connect" to the WAP, but if you use the wrong type of encryption, the WAP won't let you go any further. Degraded signal strength, lost packets, and latency would delay you from getting through to the Internet, but they shouldn't block you Typically, the subnet mask is not configurable in most SOHO WAPs
Which of the following technologies enable multiple OSs to run at the same time on a single machine?
Virtual machines Virtual machines enable you to install multiple OSs on a single machine. VMWare is a classic example of this Multi-boot and/or multiple hard drives will allow you to have multiple OSs, but not running at the same time. Bonding is where you take two network cards and make them work together for increased throughput or redundancy.
Jill is a network technician who is concerned about the amount of power consumption and heat generated by the multiple servers needed in the organization. She also has a problem of very little space in which to install and operate her tacks of servers. Which of the following technologies should be implemented to lower power usage and heat and to reduce space needed?
Virtual servers Virtual servers enable multiple servers to operate within a single physical server, reducing power requirements, heat generations, and space requirements. Circuit switching is a network link between a sender and a receiver Network address translation enables a single IP address to be shared by multiple uses. Power over Ethernet uses network cable to carry power instead of using wall power for devices
Which of the following technologies would MOST likely require SIP ports to be open on a firewall?
VoIP VoIP is used in a virtual phone system. SIP or sessions initiation protocol is widely used in most VoIP connections. VLAN trunking is used to connect VLANs together, and virtual storage and virtual desktops don't use SIP.
A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, she notes that the laptop is trying to reconnect to the wireless network. Which of the following is a common wireless problem that can cause this issue?
Weak signal strength Weak signal - This is perhaps due to more structure between her laptop and the WAP. Regardless, her system dropped the network and is trying to reacquire it. Because she is not changing networks, the SSID and encryption type didn't change so they can't be the cause. This isn't a latency issue.
You work as an assistant network administrator for a medium sized company. You have been tasked with maintaining your company's configuration management documentation. When would it b e a good time to make update to your network maps?
When a router has been moved to another location Network maps are the physical and/or logical representation of our network. When/if you physically move a router, switch, server, and so on, it would be a very wise plan to update any documentation that refers to its location The fact that you have 50 new employees added ti your domain won't change the physical layout of your network Before or after the audit comes across as not very proactive
Which of the following WAN technologies does not use traditional cabling methods as a netowrk medium but can be used to long distances?
WiMAX WiMAX is a wireless technology that can be used to transmit data over very large distances. Other types can include LTE, Cellular, and HPSA+. ADSL, T3, and ATM are all WAN technologies that require a wire-based network medium.