CIS102A W1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

horizontal cabling

A client contacted you to avail your services of cable installation. The requirement is to set up a connection which connects workstations to the data room, and the distance between them spans 87 meters. Which of the following cabling methods would be an ideal option for this assignment?

Router

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.

Mac

A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation?

A wiring diagram

A client who has a small office setup has complained about a faulty wired connection in their LAN as a result of which they are unable to use the broadband service to access the Internet. You, as a network technician, have to solve the matter. Which of the following will you need to access the situation?

The implementation phase

As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?

Port 3389

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

He should have the HVAC sensors connected as network devices themselves.

Hari has been employed by Telnet Softtech Ltd. as a senior network engineer. Analyze which of the following statements he should keep in mind while visiting the data room of a multinational company for monitoring and security purposes.

He should use POP3 to deliver the message. (Post Office Protocol)

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation?

Open up port 1433

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved.

the entrance facility

Hill Corporation Ltd., an Internet service provider, has been providing networking solutions to Riverdale High School for over a year. However, recently the administration at Riverdale high School has been complaining of an unstable connection. You are employed by Hill Corporation for the purpose of inspecting the issue at hand. What would be your first check point to ensure that there are no network issues from the service provider's end?

3.2 cm

If a twisted-pair cable has a diameter of 0.8 cm, which of the following options would you apply as the bend radius of the cable so that data transmission is not impaired?

operating system patch

In reversing a software upgrade, which of the following types of upgrade uses the patch's automatic uninstall utility for reversing?

ip

JHS Mediaworks has contacted you to troubleshoot some TCP/IP errors on some workstations within the organization. On inspection, you get to know that the workstations functioning on Windows are all stable and the ones running on UNIX and Linux systems are the ones that need troubleshooting. Which of the following command-line tools will you use in such a scenario to view and manage the TCP/IP settings?

Roll out changes in stages

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.

Unicast address

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

ping 8.8.8.8

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful.

A combo device (functions as both a switch and a router)

Marvin has been working as a senior technician at GIK Corporation. The managing director has requested Marvin to establish a similar network connection at his personal property. Which of the following categories of routers should Marvin prefer in such a scenario?

Change management procedures should consist of preparing a backup plan as well.

PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional. Which of the following statements should Suleiman consider while considering a change in a network?

A.) A network operating system is much more expensive than a desktop operating system.

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you? A.) A network operating system is much more expensive than a desktop operating system. B.) A peer-to-peer network model allows network problems to be diagnosed and monitored from a single place. C.) Peer-to-peer networks are scalable and so they are beneficial. D.) Peer-to-peer networks generally have secured access points preventing unauthorized access.

Port 443

Riverview Union High has contacted you to establish secure communication over the computer network by encrypting the communication protocol using SSL. What port will you use to secure the connection?

IDF

Royal Global University has just set up a new department for biotechnology and has hired you to extend the network connection to this department. Which of the following equipment do you think is necessary while extending the connection?

Special instructions

Sphinx Infra Ltd. has doubts on how to meet the various privacy, security, and safety precautions installed for their network. You have been hired to analyze the existing modules for which you will need to go through the network documentation before suggesting any change. Which segment in the network document will contain the necessary information you require?

Ensure that the cables are at least 3 feet away from fluorescent lights or other sources of EMI.

The Cambridge Law Department has complained of a loss of network signal from time to time. On inspection, it has been noticed that the loss of signal is due to noise interference at the physical layer. Analyze which of the following measures should be taken to sort out this issue.

5061

The Mosiac Music School has hired Kirk to set up a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided?

CAN (Campus Area Network)

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?

Telecommunications room

What are larger data rooms also known as?

Vertical cross connect

Which of the following is a component of backbone cabling that runs between building floors?

a system life cycle

the process of desigining, implementing, and maintaining an entire network is called _____.

443

which is the secure port for HTTPS?

Install cable through conduits

As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water?

Patch panels

As a senior network engineer, which of the following would you use when you are setting up a network connection at a university and you have to connect and organize lines running from walls to racks to network devices?

.biz

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements.

The network layer (The network layer is the layer where routers typically function)

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

A star topology

Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario?

sudo hostname

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?

IP Scanner

Katy, a senior technician, wants to document all the devices that are connected to the network of Ford Industries, which has a large complex network. She wants to ensure that all information in the network, including the hostnames, manufacturer names, operating systems, and IP addresses, are well-documented. Which of the following tools should she opt for to carry this out?

Transmission Control Protocol (TCP)

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. What protocol would you apply in such a scenario?

Every floor in the building has an individual IDF

The University of Mordor houses almost 1000 students in its campus. It has multiple buildings in the campus where free food and Internet services are provided for the students. The University boasts of providing one of the fastest Internet experiences in the country and there have never been any reports of the service going down. To ensure such efficient connectivity, the University adheres to the ANSI/TIA standards to better manage the data feed from the main data facilities. Which of the following can be reasonably inferred from the above scenario?

a private port number

The administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address?

A.) UDP (user datagram protocol)

Tom, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for? A.) UDP B.) IMAP4 C.) SNMP D.) TCP

Multicast address

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

Microsoft SQL Server

What DBMS applications would you use if you were to organize data into tables and records?

SAN (Storage area network)

Which of the following consists of high capacity data storage devices in a distinctly defined network segment?

Presentation layer (responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read)

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

Punchdown tool

You are a network technician who, on inspection, has found that one of the cables is faulty as a result of which you now have to insert a new piece of twisted pair into the data receptors to complete the circuit. Which of the following will you apply to sort this issue?

Plenum-rated cable

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario?

Rack

You are an employee for Asianet Solutions, which is an ISP. Rickwell Infrastructures has hired Asianet Solutions to establish a network connection in its organization. You have been sent to its office to stack up the routers, servers, and switches. Which of the following options would you use in such a scenario?

Network configuration

Larry is a senior technician who has to document the recent troubleshoot he carried out at Kroger Industries related to the baseline configuration of network devices. Larry is still unsure as to what category type he should document the troubleshoot so that it falls under standard operating procedures. Analyze which of the following category types Larry should opt for in such a scenario.

Web Service

What client-server applications use Apache and Nginx?

Knowledge Base

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?

a network diagram

What is a graphical representation of network devices and connections known as?

To document problems and their resolutions

What is help desk software used for?

Payload

What is the data passed between utility programs or applications and the operating system known as?

Domain

What is the logical group of Windows Servers controlling the network access to a group of computers also known by?

100 m

What is the maximum allowable distance for horizontal cabling?

Rollback

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as?

Test your theory to determine the cause

What is the third step in a network troubleshooting methodology?

L7PDU

What other technical name or PDU can be used to represent the session presentation and application layer?`

Verify functionality and implement preventive measures.

What should be the ideal procedure after implementing the solution to a network troubleshooting problem?

It will increase the possibility of transmission interference between wires

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be.

ip help

Which command displays the full list of available objects and commands?

169.254.0:1

Which of the following addresses can be identified as an APIPA address?

Plenum cable

Which of the following cables comes coated with a flame-resistant jacket?

Horizontal Cabling

Which of the following cabling methods connects workstations to the closest data rooms?

ipconfig

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

UTP

Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath?

a rack diagram

Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack?

Resolvers

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

IEEE

Which of the following institutions assigns a manufacturer's OUI?

C.) Active Directory

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers? A.) Clients B.) RAID C.) Active Directory D.) Workgroups

An MSA (master service agreements)

Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

Data room

Which of the following is an enclosed space that holds network equipment?

HVAC

Which of the following is an example of an industrial controls system?

Forwarding DNS Server

Which of the following is an optional server that receives queries from local clients but doesn't work to resolve the queries?

Patch cable

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

Router

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

Well-known ports

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

ICMP

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network?

Square-hole racks

Which of the following server racks would you use for a bolt-free mounting?

10.42.3.87:23

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87?

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? A). They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. B.) Access to multiple shared resources can be centrally granted to a single user or a group of users. C.) Problems on the network can be monitored, diagnosed, and fixed from one location. D.) User accounts and passwords to the networks are all assigned in one place.

D.) In a peer-to-peer network model, each computer controls its own administration, resources, and security.

Which of the following statements is true? A.) In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. B.) Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network. C.) Physical topologies mostly refer to how software controls access to network resources. D.) In a peer-to-peer network model, each computer controls its own administration, resources, and security.

B.) An email can be downloaded to the client's computer using POP3.

Which of the following statements stands true? A.) HTTP is a secure protocol that provides secure transmission. B.) An email can be downloaded to the client's computer using POP3. C.) The DBMS does not support a multiuser environment. D.) FTP servers provide secure encryption for file transfer.

Backbone

Which of the following terms is also referred to as a "network of networks"?

MDF

Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?

AAAA records

Which one of the following DNS record types holds the name-to-address mapping for IPv6 addresses?

Network Layer

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

25

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?

Fiber optic cable

Yang, a network engineer, has been tasked with establishing a new long-distance connection for the branch offices between Manhattan and Texas by an ISP. In doing so, analyze which of the following cables he should opt for in order to obtain maximum speed and bandwidth.

Use a top-to-bottom OSI layers approach

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?

a hockey-puck shape with two arrows pointing inward and two arrows pointing outward

You are a junior technician at KVM Solutions. They have just received a query from a university who wants their network connection to be set up. You have been tasked with sketching a diagram for the various network devices that will be used to establish the connection. Which of the following options would you apply to identify the routers in that connection?

An RFP

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

CNAME record

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

Backbone cabling

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand?

Rollback

You have been hired to implement a major change in the financial software used by the accountants at a fast-food chain. On implementation, you notice that the devices are not compatible with the upgrade and have started showing errors, as a result of which the organization is unable to function. What would you do in such a situation?

VoIP

You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario?

ping 127.0.0.1

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running?

apt-get install dnsutils

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?

Incorrect DNS

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing?

CAN (Campus Area Network)

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered?


Ensembles d'études connexes

Drug Education All Missing Cards

View Set

Chapter 16: How Populations Evolve

View Set

INS475 Multiple Choice Questions

View Set

Chapter 16: Nose, Mouth & Throat

View Set

EC#13 Use it, EC#14 Be Resourceful

View Set

CNA 101 - Module 7 - Ethernet Switching

View Set