Networking Final Study(Pre-Assessment)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

MSA

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number

Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue.

By checking if the connection has any jitter

Jasmine has been working as the chief accountant for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network administrator, has recently discovered that Jasmine is actually the same person who creates as well as authorizes the vendor account payments. Analyze if any of the following agreements has been violated in this scenario.

PUA(Potentially unwanted application or applications)

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand?

A BPDU filter

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system?

Back doors

In the formula 2^h - 2 = Z, what does h represent?

h equals the number of bits remaining in the host portion.

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario?

A bus topology

Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands?

Rapid elasticity

Neon Printers has set up a full network of laptops for the purpose of running multiple printing projects simultaneously. It has contracted Theo Solutions to provide network security solutions while protecting its network from certain traffic. Analyze which of the following is best applicable in this scenario.

Using a network-based firewall

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?

100 Mbps (Fast Ethernet)

Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario?

Departmental boundaries

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE(Generic Routing Encapsulation)

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management?

PRTG dashboard by Paessler

JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario?

Racks

You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario?

SoD

The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario?

Tone locator

Mojaro Bank at Datona has contacted Vincent, a network provider, to provide Mojaro with a network connection that will enable it to securely conduct financial transactions with the other branches situated across various states in the United States as well as with the International Monetary Fund. Analyze which of the following connections would be best suited in this scenario.

WAN

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?

WPS attack

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.

802.11g

A client has complained of losing Internet connectivity. You as a network engineer troubleshoot the error, and you find that the source of the error is the computer's wired connection. You decide to solve the issue by replacing the wired connection with a wireless one. What kind of an issue are you resolving in this scenario?

Interface errors

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

SSH


Kaugnay na mga set ng pag-aaral

Real Estate Contracts and Agency

View Set

Maslow's hierarchy of needs includes all of the following except:

View Set

How to Calculate Mortgage Amortization

View Set

ch 4 health promotion for the developing child

View Set

Portfolio Management: Module 53: Systematic Risk and Beta, CAPM and the SML

View Set

AH1 MOD 6 CARDIO Shock Iggy NCLEX, Iggy Chp 35 - Care of Patients with Cardiac Problems, CH 33, 35 Cardiac, Nursing Management: Coronary Artery Disease and Acute Coronary Syndrome, Nursing Assessment: Cardiovascular System

View Set