Network+ Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How many bits of a class A IP address are used for host information?

24 bits

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

switchport trunk native vlan

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?

-80 dBm

Which formulas can be used to calculate the magic number? Choose two

2h 256 - the interesting octet

How many bits are used in a network with a subnet of 255.0.0.0?

8

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

A more negative RSSI value indicates a higher quality of signal.

Analyze which of the following can be used to establish a static VLAN assignment for a device.

Assigning a VLAN based on the switch port the device is connected to

Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses?

CARP

Which protocol replaced TKIP for WPA2?

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, Cat 6a, Cat 7

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

Cat 6a

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario?

Cat 7

Which assignment technique requires a RADIUS server?

Dynamic VLAN assignment

Which function of WPA/WPA2 security ensures data cannot be read in transit?

Encryption

You are working as a network administrator for an ISP. You receive a complaint about fluctuations in the network speed despite using a fiber-optic cable. On checking the situation, you are of the opinion that you will need to cut a clean slice through the fiber strands. Which of the following kits should you carry for this purpose?

Fiber cleaver

Mr. Chadwick has recently set up a network connection for a client wherein he made a transition between an SMF and an MMF cable using a fusion splicer. Around a week later, the client calls him up and raises a concern about fluctuations in the network. Mr. Chadwick decides to conduct an on-site inspection, and he gets to know that the reason behind the fluctuation is that the transmission has not traversed successfully. Analyze which common fiber problem Mr. Chadwick is referring to in this case.

Fiber type mismatch

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second?

Giga

When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?

Hypervisor

In the formula 2n = Y, what does n represent?

It is the number of bits that must be switched from the host address to the network ID.

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which cloud management technique executes a series of tasks in a workflow?

Orchestration

Which cloud service model gives software developers access to multiple platforms for testing code?

PaaS

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

Passive twinaxial cable

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?

SAID

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project?

SMF

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

classless addressing

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

Spectrum analyzer

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

Stack master

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

Static VLAN assignment

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

The default VLAN should not be used.

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

Trailer

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection?

Untagged frames

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____.

a router-on-a-stick

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

255.0.0.0

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

255.254.0.0

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

Diffraction

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?

Load balancer

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots?

TDM

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath?

UTP cable

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANS, WANS, and the Internet?

iSCSI

What information does the switchport port-security command use to restrict access to a switch's interface?

MAC address

Which fiber connector contains two strands of fiber in each ferrule?

MT-RJ

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traftic. Which of the following do you plan on using to fix this issue?

Storm control

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

Which of the following is a multipath link-state protocol

TRILL

You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature?

The management plane

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

Which type of switch connects all devices in a rack to the rest of the network?

ToR switch

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Trunk

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?

Virtual switch

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

White/green

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action?

shutdown

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards?

100 Mbps (Fast Ethernet)

Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement?

100GBASE-T

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 dB. What is the throughput that is being received at the moment as per your calculations, keeping the 3-dB rule in mind?

250 watts

What is the formula for determining the number of possible hosts on a network?

2h - 2 = Z

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue.

5.925 GHz-7.125 GHz just remember 5.925

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?

8 bits

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11ax remember ax

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

802.11b

Which IEEE standard determines how VLANs work on a network?

802.1Q

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. Hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most?

A community cloud

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?

A layer 3 switch

Scott & Wayne Law Associates is a private law firm in Atlanta specializing in cases involving violation of environmental laws. The firm currently has approximately 50 employees who all work on various matters and in diferent departments. You have been hired as a network administrator and tasked with finding a suitable cloud model for the firm. The firm is looking for a comparatively low-cost cloud model that can be accessed only by the employees and senior management but not its clients or third parties. Which of the following cloud models would you choose?

A private cloud

Which transmission characteristic is never fully achieved?

Bandwidth

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

Captive portal

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario?

Community VLAN

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil twin

Which one of the following wireless transmission types requires a clear LOS to function?

IR

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

Hypervisor

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

Insufficient wireless coverage

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here.

Jitter

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

As a network administrator, you want to modernize your network with modular software running on standard server platforms. You want to start by replacing traditional, custom-designed network equipment. You also wish to have flexible, cost-saving options for many types of network devices, including virtual servers, data storage, load balancers, and firewalls. Which of the following will you use in such a scenario?

NFV

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation.

Order switches that allow upgradeable interfaces

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

PEAP

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?

Rogue AP

You have been working as a network administrator at Yong Solutions, which is an ISP (Internet service provider). The switches used in the storage network of the ISP essentially use the STP (Spanning Tree Protocol) for detecting link failures. You have been asked to upgrade the STP because repeated reports of network transmissions being bogged down have been received. Which of the following will you use in this scenario?

SPB

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Sequence Control

What is the term used to identify the first four blocks that normally help to identify a network?

Site prefix

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

Wi-Fi analyzer

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

Wireless range extender

Which of the following transceivers supports up to 10 Gbps?

XFP

Blue Whale is an e-commerce website that has hired you as part of the network management team. The network administrator has delegated one of his tasks to you, which requires you to allow and configure more than one MAC address in one of the ports. Which of the following commands will help you complete the task at hand?

allowed-mac

Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations?

the infrastructure plane

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

IBSS

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

RSSI

Which of the following protocols can detect and correct link failures in milliseconds?

RSTP

Which of the following wireless technologies does not use the 2.4 GHz band?

Z-Wave


Ensembles d'études connexes

Pediatric Cancer NCLEX Questions

View Set

Chapter 11: Inflammation and Wound Healing

View Set

FTCE: Elementary Education K-6: Science and Technology

View Set

cervical muscles and muscles of facial expressions

View Set

Lecture 5 - Financial Ratios (analyzing and interpreting financial statements)

View Set

General Psychology Chapter 15 and 16 Study Questions

View Set