Data comms

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.

802.11g

Dwight is a fresher who has been hired as an assistant to the head network administrator. Which of the following 802.11 wireless standards should Dwight have an understanding of so that he can assist his senior in setting up a wireless standard that has a theoretical throughput of 600 Mbps?

802.11n

You have been hired by Zebra Infotainment as a network administrator. Your first task on the job is to document the list of all the vendors. Under which category would you put the list of vendors while creating a network document?

Contacts

Which of the following is also known as telecommunications room?

Data room

Which of the following will act as the point where the WAN ends and the LAN begins?

Demarc

Which of the following cables transmits data via pulsing light?

Fiber optic cable

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet mask

What is the combination of a public key and a private key known as?

Key pair

Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

MSA

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?

MX record

Which of the following protocols is used for encrypted control of remote Windows computers?

RDP

The University of Zotto wants to upgrade its network so that the dean of the university can deliver important information related to students and teachers directly to the campus monitors located in the vicinity. The university has hired a firm named Internet Solutions for this purpose. The firm has come up with a solution where it will use a central receiver to distribute video signals to multiple monitors within a building. However, the firm is still not sure about the kind of cables it will be using as the allocated budget is not extensive. Analyze which of the following should be ideal in such a scenario.

RG-59 cables

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

SSH

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

VNC

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig

A client has complained to you about low signal strength in his office. You want to ensure that the issue is resolved, and for that purpose, you plan to place the Wi-Fi client very close to the AP (access point). What level of RSSI (received signal strength indicator) rating will you check to fix this issue?

-30 dBm with an excellent rating

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?

100 Mbps (Fast Ethernet)

What is the frequency range for cellular communication?

1850 MHz-1990 MHz

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23

You have been contracted to install a wireless network connection at Vice City Public School. The school management has requested you to install the latest available Wi-Fi technology for the students. Which of the following frequencies will you use to establish the connection in this scenario?

5.1 GHz-5.8 GHz

Tyler has plans of setting up a cellular network distribution plant for which he has contacted you to act as a service manager. Your first job as a service manager is to document the necessary frequency range under which this 800 band will be operational. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

824 MHz-896 MHz

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario.

A bus topology

You are a senior programmer for Mercantile Timber Ltd., and you have been tasked to develop a database that would contain all the user account information and security for the entire group of computers operating within Mercantile Timber Ltd. Can you apply any of the options provided?

AD

Your client has multiple LAN connections for his business. He wants you to install a device so that the traffic between two networks can be efficiently managed by finding the best path for traffic to get from one network to another. Which of the following will you use in this case?

An industrial-grade router

You have been hired by an ISP to extend the WAN connection to a housing society in Manhattan. Your primary job is to ensure that the fiber cable connection is appropriately connected to the LAN in the society after which a network engineer will be sent by the ISP for further proceedings. At what point does your job end in this situation?

At the demarcation point

Globe Communications is a well-known ISP that has hired Michelle as a network administrator. Recently, the administration department at Move Makers Ltd. sent an enquiry to Globe Communications if it could set up a connection using either a fiber cable or a wireless link that connects the main distribution frame (MDF) and the entrance facility at Move Makers' newly established Manhattan branch. Michelle has been appointed for this project. Analyze which of the following cabling methods would be an ideal option for this assignment.

Backbone cabling should be used as it will provide a vertical cross connect.

Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?

Class B

Which of the following protocols is used to transfer files between two computers?

FTP

You are working as a network administrator for an ISP. A ticket has been raised by a consumer complaining about fluctuations in network speed despite using a fiber-optic cable. The inner wiring of the cable needs to be checked for which you have decided to strip off the outer layer of the fiber cable. Which of the following tools will you carry for this purpose?

Fiber stripper

Which of the following transmissions allows a signal to travel in both directions simultaneously?

Full-duplex

Area You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE

Howard has recently installed a network connection for a workstation where he has made network connections accessible through both wired and wireless connections. Before finishing the installation, he wants to check whether the computer is making conflicting attempts to communicate with the network through both types of connections. After inspection, he realizes that the computer is indeed making conflicting attempts. Which of the following steps will help Howard in resolving the issue?

He can resolve the issue by disabling the Wi-Fi adapter or by unplugging the Ethernet cable.

The Jaypeg Group of Institutions has come up with a new department for sociology. It has hired you to complete the network setup for this department. On inspection, you get to know that you just need to extend the connection provided by an existing ISP. Where will you, as a network engineer, extend the connection to in such a case?

IDF

Which type of crosstalk occurs between wire pairs near the source of a signal?

NEXT

Kevin Mills is a network technician who has been hired by Globcom Telecommunications to fix an error related to emails and messages. The error primarily did not allow the messages sent out by the HR department to arrive intact at the receiving applications on the employees' workstations. Kevin plans to follow the OSI model for troubleshooting. Analyze the statements and suggest which layer of the OSI model Kevin should inspect to understand and resolve the issue.

One should troubleshoot the issue using the session layer.

Which of the following represents a network of personal devices?

PAN

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.

Port 5061

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

Port 69

JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario?

Racks

Which of the following terms would you use when a server uses a hard disk as a backup in case a hard drive fails?

Raid

As a network engineer, you have installed a wireless connection in a newly constructed office floor for Black & White Communications. The CEO's office files a complaint about slow data transmission with the IT department. The IT department gets in touch with you to fix this error. On inspection, you realize that the problem is primarily because of large obstacles like walls and ceilings because of which the wave bounces back to its source. What of the following phenomena will you state as a cause of this error while reporting to the IT department?

Reflection

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out

RCB Logistics wants to upgrade the cabling of its network as it was still running on older fiber networks. It has outsourced the cabling project to Bear & Co. that appointed Watson as a network engineer. On inspection, it gets to know that the older fiber networks were connected using an ST connector. Watson decides that he will replace the SMF cables with MMF cables in order for the signaling to be in full-duplex mode. Analyze which of the following connectors would be most ideal in this situation for Watson to replace the cables.

Replace the cables using an MT-RJ connector

A client has contracted you to fix an error arising from an employee's workstation. You try to fix the error by doing a system upgrade. Post the upgrade, you notice that the system is not booting up. Which of the following processes will help you to revert the system to the previous version?

Rollback

Which of the following explains how to properly handle substances such as chemical solvents?

SDS

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment

You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?

Syslog

You have been called to troubleshoot a problem, and you have successfully managed to establish a theory of probable cause. You have managed to reach this layer after considering multiple approaches through the OSI model. Which recommended step should you perform next if you follow the OSI model of troubleshooting?

Test your theory to determine the cause.

Which of the following terms refer to the number of data bits (0s and 1s) that are actually received across a connection each second?

Throughput

The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario?

Tone locator

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

Urgent pointer

Frank has been appointed as a network engineer with an Internet service provider firm. His first assignment as an engineer is to set up a 1000BASE-T standard Fast Ethernet for Horizon Corporates. While doing so, the ISP has specifically requested him to concentrate on installing the necessary twisted-cable pairs as all the other specified standards will be looked after by the other members of the team, which has been allocated for this project. Analyze which of the following pairs of twisted cables Frank should use in this scenario.

Use a Category 5e cable for this scenario

You are the proprietor of an export business. Currently, the wireless network in your office is using the WEP (Wired Equivalent Privacy) standard. It offers two forms of authentication: OSA (Open System Authentication) and SKA (Shared Key Authentication). However, neither of them is secure. Your requirement is of an authorization service that provides a central authentication point for wireless, mobile, and remote users. Which of the following will you use in such a scenario?

WPA-Enterprise or WPA2-Enterprise

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?

WPS attack

You are working as a network engineer for an ISP. A ticket has been raised that there has been severe attenuation, which has decreased the transmission speed significantly. On inspection, you notice that the reason for this issue is that the transmissions are optimized for one type of cable but sent over a different type of cable. You are now required to send this analysis to the head office for further instructions. Under which of the following common fiber connection problems will you associate this issue?

Wavelength mismatch

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?

dig google.com

You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?

ping

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

tcpdump

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

tracert


Ensembles d'études connexes

Intro to Interior Design: Test 2

View Set

Practice Exam Questions 10/10/23

View Set

Marketing 340 Exam #2 (Possible Questions)

View Set

Ch11 Workplace Psychological Health

View Set

ExamFx: Property and Casualty Insurance

View Set