Quiz 6, 7, 8, 9, 10

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following switches can be configured via a command-line interface or a web-based management GUI (graphical user interface)?

A managed switch

Glenn, who is working as a network engineer, has been instructed to automate many tasks to work together in a complex and lengthy workflow. What is the term for this process?

Orchestration

Mr. X wants to use cellular technology that offers at least 5 Mbps of download speed. He consults you about this. Which of the following cellular technologies will you suggest?

5G

How many bits are used in a network with a subnet of 255.0.0.0?

8

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation?

802.11ax

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band?

802.11ax

HealthCity Nursing Home is a newly opened hospital with many employees, doctors, nurses, and support staff. The upper management of the hospital wants to draft a security policy that outlines the guidelines, rules, restrictions, and consequences of violations, all of which help minimize the risk involved in allowing restricted access to some users. The doctors who have access to protected patient information must be informed what they can and can't do with that patient data and what special precautions they must take to protect patients' privacy. Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?

A PUA (privileged user agreement)

Which of the following is a distinct network of storage devices that communicate directly with each other and with other portions of the network?

A SAN

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?

A load balancer

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?

AUP

Analyze which of the following can be used to establish a static VLAN assignment for a device.

Assigning a VLAN based on the switch port the device is connected to

In which of the following modes will a vNIC access a physical network using the host machine's NIC?

Bridged mode

Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer?

CSU/DSU

The University of Claudine plans on opening a new IT division for underprivileged students so that it can offer education free of cost to them. However, the university wants to ensure that there are no data breaches, so it has requested the network administrator to handle the configurations of the computers in order to comply with the organizational policies. Analyze which of the following practices the university should adopt in this scenario so that the network securities are not compromised.

CYOD

Game Zone is a well-known games park located in Manhattan that allows gamers to engage in multiplayer competitions. The competitions function smoothly on the opening day, but on the following days, there are multiple instances of the computers getting disconnected temporarily from the wireless network. These connections however function normally when they are reconnected. Which type of attack is this most likely to be?

Deauth attack

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

Departmental boundaries

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administrator to determine the best solution to this problem. Which type of routing path will you use to solve this problem?

Dynamic route

Identify which router connects an autonomous system with an outside network, also called an untrusted network.

Edge router

Which of the following refers to any router outside an organization's AS(autonomous system), such as a router on the Internet backbone?

Exterior router

Jasper Infotech have an issue with their network system-a malfunctioning NIC on a router caused network outages. They have hired you specifically to ensure that the network system does not collapse when there is an unexpected hardware or software malfunction. Which of the following terms will you refer to while fixing this issue for Jasper Infotech?

Fault tolerance

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?

Geographic locations

You are working as an executive for a cable company. A client raises a request to set up a network that uses fiber-optic cabling to connect your company's distribution center to distribution hubs and then to optical nodes near its customers. From the following network options, which one would you recommend in the given scenario?

HFC

Kristen has plans of starting an online food delivery company. She plans on making the company one of the most secured portals for online food delivery. She hires Brad, a network consultant, to guide her through the necessary security protocols. Brad conducts all the necessary security checks and involves a white hat hacker too to point out any vulnerability that might be overlooked. Analyze if Brad needs to conduct any other risk assessment procedures in this scenario.

He should conduct a vendor risk assessment.

Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?

Honeypot

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

Hypervisor

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?

Incorrect VLAN assignment

In the formula 2n = Y, what does n represent?

It is the number of bits that must be switched from the host address to the network ID.

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario.

Layer 4 switches

Bradley has been running a business in his garage for over a period of 10 years. He plans on expanding the business by opening up three new offices in three different cities. Since he has accumulated sufficient profits to move to a larger office space, he plans to upgrade his network connection to one with a dedicated and symmetrical bandwidth. Bradley approaches Mantle Solutions, an ISP. Which of the following options should be offered by the ISP in this scenario?

Leased lines

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

As a developer, you need frequent access to multiple platforms during the development process. Rather than purchasing and maintaining a separate device for each platform, you have decided to avail the cloud service option. You are looking to build and test the applications within these virtual, online environments, which are tailored to the specific needs of the project. The cloud service model should have servers that provide only the resources needed to run an application and also allow customers to run their code directly in the cloud without having to manage a server environment at all. Which of the following cloud service models do you think would be appropriate considering your requirements?

PaaS

Bryden is a network analyst who has been recruited into Big Bay Burger's security management. Which of the following terminologies must he use to explain to the company's employees about the possibility of someone using a deception in following them into a restricted area?

Piggybacking

At a security training exercise, you had to devise a strategy to penetrate into an organization's data room by accessing one of their employee's ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?

Quid pro quo

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

RADIUS

You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?

Rapid elasticity

You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available so that the path to the destination can be shortened. Which of the following will help you in doing so?

Routing cost

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information? Data

Sequence Control

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario?

Switch spoofing

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique

Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances.

Use the EAP-TLS encryption to protect communications

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

VLSM

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Which of the following traverses a significant distance and usually supports very high data throughput?

WAN

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

Wireless range extender

Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?

Zero-day exploit

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____

classless addressing

Which of the following commands can be used to change a device's name?

hostname

The part which identifies the network in an IPv4 address is known as _____.

the network ID


Kaugnay na mga set ng pag-aaral

A2 ch 40 gastric and duodenal disorders

View Set

Physical Science Review Questions: Chapter 3 Measurements

View Set

30-Hr. TX Promulgated Contract Forms Course

View Set

System Administration and IT Infrastructure Services. Week 4: Directory Services

View Set

Chapter 37- Partnerships and Limited Liability Partnerships

View Set

Product Liability and Warranties

View Set

Chapter 7 - Ethical Decision Making

View Set