IT-212 Module 6 - NP6.0

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? A traffic shaper A caching engine An application-specific integrated circuit Ethernet bonding

An application-specific integrated circuit

Which of the following are true regarding cloud computing? (Select three.) Cloud computing requires end user knowledge of the delivery system's physical location and configuration. The term cloud is used as a synonym for the internet. Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser. Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet.

Cloud computing consists of software, data access, computation, and storage services provided to clients through the Internet. Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser. The term cloud is used as a synonym for the internet.

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal? Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection. Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. Implement a host-based firewall on each Windows 2000 workstation, and configure them to automatically download and install updates. Install antivirus software on the Windows 2000 workstations, and configure them to automatically download and install updates.

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You manage your company's website, which uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure on a single component doesn't cause the website to become unavailable. What should you add to your configuration to accomplish this? Connect one server to the internet through a different ISP. Reconfigure the disk array in a RAID 1+0 configuration. On each server, add a second network connection to connect the server to the shared storage device. On each server, add a second network connection to the internet.

Connect one server to the internet through a different ISP.

Which of the following are benefits that a VPN provides? (Select two.) Cost savings Metering Faster connection Easy setup Compatibility

Cost savings Compatibility

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution.) Disconnect the network cable from the hypervisor's network interface. Create a new virtual switch configured for host-only (internal) networking. Disable the switch port that the hypervisor's network interface is connected to. Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces. Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for bridged (external) networking.

Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next? Fix the problem. Create an action plan. Document the problem. Determine if escalation is needed.

Determine if escalation is needed.

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.) ESP L2TP EPS AH SSL

ESP AH

A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown below. What should you do? (Choose two. Each response is a complete solution.) Remove the patch cable connecting the first switch to the third switch. Enable STP on each switch. Replace the patch cables connecting the switches together with red crossover cables. Enable port security on each switch port. Connect the patch panel to the switches with red crossover cables. Consolidate all patch cables from the patch panel to a single switch.

Enable STP on each switch. Remove the patch cable connecting the first switch to the third switch.

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement? Ethernet bonding Spanning Tree QoS Traffic shaping

Ethernet bonding

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model should you use? IaaS SaaS DaaS PaaS

IaaS

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next? Apply the patch to the router. Document the problem and the solution. Identify possible side effects of the solution. Identify the affected areas.

Identify possible side effects of the solution.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Route VM-to-VM traffic through a physical firewall and back to the virtual network. Create a virtual router with VRF technology. Implement a virtual firewall within the hypervisor. Define VLAN memberships on each VM.

Implement a virtual firewall within the hypervisor.

Which of the following devices accepts incoming client requests and distributes those requests to specific servers? Media converter CSU/DSU Load balancer Caching engine

Load balancer

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? Multilayer switch Unmanaged switch Layer 2 switch Layer 1 switch

Multilayer switch

Which key advantage does a virtual router have over a physical router? Routing protocols are not necessary for routing data between networks. Multiple networks can connect to a single interface. It has faster routing performance. It allows Virtual Router Redundancy Protocol (VRRP).

Multiple networks can connect to a single interface.

Which of the following statements are true about virtual NICs? (Select two.) Multiple virtual NICs can be added to a virtual machine. Virtual NICs can only communicate with other virtual NICs. Virtual NICs need the appropriate driver to function. Virtual NICs don't have a MAC address. The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated.

Multiple virtual NICs can be added to a virtual machine. NICs need the appropriate driver to function.

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task? Virtual private network (VPN) Network segmentation Port security Data encryption using PKI

Network segmentation

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS on the rack along with redundant power supplies for the server. Will this configuration work? Yes, this configuration complies with data center best practices. No, you should not use blade servers for virtualization. No, you must implement the UPS and power supplies on the rack externally. No, you should not run a cable across the data center floor. No, you must use a cross-over cable to connect the two switches together.

No, you should not run a cable across the data center floor.

With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 filter? Only packets with 192.168.0.34 in either the source or destination address are captured. Only packets on the 192.168.0.34 network are captured. Only packets with 192.168.0.34 in the destination address are captured. Only packets with 192.168.0.34 in the source address are captured.

Only packets with 192.168.0.34 in either the source or destination address are captured.

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? IPS Packet sniffer Port scanner IDS System logs

Port scanner

What is the purpose of using Ethernet bonding? (Select two.) Enables dual remote access (DRA) over a WAN link Increases network performance Increases read and write operations between the system bus and network adapters Provides increased bus speeds Provides a failover solution for network adapters

Provides a failover solution for network adapters Increases network performance

Which of the following are IPsec modes of operation? (Select two.) Multimode Secure mode Single mode Transport mode Tunnel mode

Transport mode Tunnel mode

In addition to performing regular backups, what must you do to protect your system from data loss? Store the backup media in an on-site fireproof vault. Write-protect all backup media. Regularly test restoration procedures. Restrict restoration privileges to system administrators.

Regularly test restoration procedures.

Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site? Remote access VPN GRE over IPsec Site-to-site IPsec VPN SSL VPN

Site-to-site IPsec VPN

What is a VPN (virtual private network) primarily used for? Support secure communications over an untrusted network. Allow remote systems to save on long distance charges. Allow the use of network-attached printers. Support the distribution of public web documents.

Support secure communications over an untrusted network.

Which of the following is the least effective power loss protection for computer systems? Surge protector Uninterruptible power supply Secondary power source Backup power generator

Surge protector

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy? Test the solution. Establish what has changed. Recognize the potential side effects of the solution. Document the solution.

Test the solution.

Why should you store backup media off site? To prevent the same disaster from affecting both the network and the backup media To comply with government regulations To make the restoration process more efficient To reduce the possibility of theft

To prevent the same disaster from affecting both the network and the backup media

You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual servers Virtual desktops Network as a Service (NaaS) Virtual networks

Virtual servers

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will run through the suspended tile ceiling in the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device on the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.) You should not run a plenum cable through a suspended tile ceiling. You should not connect networking equipment to a 20-amp wall circuit. You should implement a UPS between the wall outlet and the network devices. You must use a straight-through cable to connect the two switches together. You should implement redundant power supplies for the network devices.

You should implement a UPS between the wall outlet and the network devices. You should implement redundant power supplies for the network devices.

Which TCP/IP utility gives you the following output? ping arp -a ipconfig netstat -a

ipconfig

Examine the following output: Active Connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost:4832 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output? netstat nslookup dig ifconfig

netstat

Which TCP/IP utility gives the following output? ifconfig ping arp -a ipconfig

ping

While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network? traceroute nslookup ifconfig tracert

traceroute


Ensembles d'études connexes

Marketing 444: Marketing Strategy Test 1

View Set

Chapter 10 - Soups, Stocks, and Sauces

View Set

LS23L Week 1 - Scientific Method and the MIT

View Set

President In The Spotlight: Theodore Roosevelt

View Set

Chap 71 Mass Casualty and Disaster Preparedness

View Set

Chapter 1 Auditing IT Infrastructures for Compliance

View Set

Chapter 04 The Way the Earth Works: Plate Tectonics guided learning

View Set