Network + Practice Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are working as a network engineer for an ISP. A ticket has been raised that states that the SMF (single mode fiber) and the MMF (multimode fiber) cables have come apart at the FDP (fiber distribution panel). On checking the situation, you realize that you will need to melt the tips of the two fibers together so that light can pass cleanly through the joint. Which of the following kits will you require in this scenario? Fiber stripper Fiber cleaver Fusion splicer Ferrule

Fusion splicer

BitBakers is a small start-up selling local bakery items in Kansas. It has its organizational back end running from a small LAN setup. Recently, it received funding for its products to be sold on a larger scale. As a result of this funding, the firm has contracted Kevin to boost up its network strength so that it can traverse to more than one LAN segment. Analyze which of the following protocols he should apply in this scenario. IP UDP TCP ICMP

IP

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained? -50 dBm -30 dBm -70 dBm -80 dBm

-50 dBm

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender? Sequence number Acknowledgment number Reserved Source port

Acknowledgment number

While setting up a network segment, you want to check the functionality of a cable before putting connectors on them. You also want to measure the termination point or damage in the cable. Which of the following tools would you use to identify this? Tone generator Multimeter kit Cable continuity tester Cable performance tester

Cable continuity tester

Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel? GRE IKEv2 L2TP OpenVPN

GRE

Which of the following utilities would you use to display TCP/IP components and connections on a host? tracert netstat tcpdump arp

netstat

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered? War driving War chalking WPA attack WPS attack

WPS attack

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer? Rollover cable Straight-through cable Crossover cable Fiber-optic cable

Rollover cable

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project? SMF MMF Twisted-pair cable Coaxial cable

SMF

Which of the following is a collection of protocols that performs both authentication and encryption? Telnet SSH RDP VNC

SSH

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up? PSH FIN URG SYN

SYN

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards? 10 Mbps 100 Mbps (Fast Ethernet) 1000 Mbps (1 Gbps, Gigabit Ethernet) 10 Gbps

100 Mbps (Fast Ethernet)

As a network engineer, you have been tasked to form a Gigabit Ethernet for connecting a data center with a data closet in an office building. Identify which of the following fiber Ethernet standards would you apply in this situation. 1000BASE-FX 1000BASE-LX 10GBASE-SR 10GBASE-LR

1000BASE-FX

Mr. Anderson had to set up an Ethernet network segment that can transmit data at a bandwidth of 1000 Mbps and cover a distance of 2000 m per segment. The available fiber-optic cable in the market was an SMF cable. Analyze and discuss which of the following fiber Ethernet standards he should follow under such circumstances. 100BASE-SX 100BASE-FX 1000BASE-SX 1000BASE-LX

1000BASE-LX

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection? 2.4 GHz-2.4835 GHz 824 MHz-896 MHz 1850 MHz-1990 MHz 5.1 GHz-5.8 GHz

2.4 GHz-2.4835 GHz

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 dB. What is the throughput that is being received at the moment as per your calculations, keeping the 3-dB rule in mind? 500 watts 250 watts 125 watts 750 watts

250 watts

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function? 1 2 3 6

3

Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case? 300072 300800 300871 300870

300871

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with? The geographical area that an antenna or wireless system can reach is known as its range. A more negative RSSI value indicates a higher quality of signal. Directional antennas transmit wireless signals along a single direction. TV and radio stations use omnidirectional antennas.

A more negative RSSI value indicates a higher quality of signal.

Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands? Security camera Smart thermostat Smart refrigerator Smart doorbell

Smart thermostat

Which wireless technology is used to track fitness activity levels and geographic movement? Bluetooth ANT+ NFC Infrared

ANT+

Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time? Frequency Throughput Bandwidth Attenuation

Bandwidth

You have been getting complaints about slow speed from one of your clients. You decide to visit the site to have a look, and you notice that the RJ-45 connector has been tampered with as a result of which there are network fluctuations. These fluctuations are taking place as the pins in the connectors are bent. Which of the following tools will you use to push the pins inside the RJ-45 connector? Wire cutter Snips Cable stripper Cable crimper

Cable crimper

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes? Cat 5 Cat 6 Cat 6a Cat 5e

Cat 6a

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction? Reflection Diffraction Refraction Scattering

Diffraction

Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server? Question 28 options: PEAP EAP-TLS EAP-FAST EAP-MSCHAPv2

EAP-TLS

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload? Ethernet NDP TCP ICMP

Ethernet

Mr. Chadwick has recently set up a network connection for a client wherein he made a transition between an SMF and an MMF cable using a fusion splicer. Around a week later, the client calls him up and raises a concern about fluctuations in the network. Mr. Chadwick decides to conduct an on-site inspection, and he gets to know that the reason behind the fluctuation is that the transmission has not traversed successfully. Analyze which common fiber problem Mr. Chadwick is referring to in this case. Dirty connectors Wavelength mismatch Link loss Fiber type mismatch

Fiber type mismatch

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second? Tera Giga Kilo Mega

Giga

Mr. Haywire has just bought a set of wireless security cameras for his backyard. Howard, a network professional, has been sent by the store to set up the security cameras. While configuring and setting up the cameras, Howard notices that he is unable to configure the in-house Wi-Fi network with the cameras because of some frequency issues. Analyze what Howard should do in this situation. He should check if the SSID is wrong. He should check if encryption protocol mismatch caused this error. He should check if an incorrect passphrase might be the cause of this error. He should set up an AP that offers a Wi-Fi standard on that band.

He should set up an AP that offers a Wi-Fi standard on that band.

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation? Captive portal Spectrum analyzer RADIUS Wi-Fi analyzer

Spectrum analyzer

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose? SSID IBSS BSS ESS

IBSS

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions? IPsec Public key encryption Private key encryption Key pair

IPsec

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here? Interference Channel overlap Insufficient wireless coverage Simultaneous wired and wireless connections

Insufficient wireless coverage

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error. Interference seems to be the cause. Insufficient wireless coverage might be the cause. Attenuation might lead to loss in signals. Lack of firmware updates might be the cause.

Interference seems to be the cause.

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch? Crossover cable Rollover cable Straight-through cable Fiber-optic cable

Straight-through cable

Josh is a new trainee at TT&P who has been sent to a client location to patch up cables connecting the switch to the data center. While doing so, Josh is unable to decide which connector to consider while connecting the ferrules of an SMF cable that measures 1.25 mm. Analyze and suggest which of the following connectors Josh should opt for under the circumstances so that there are minimum back reflections. LC ST MT-RJ SC

LC

Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload? Layer 4 Layer 1 Layer 2 Layer 3

Layer 4

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator? Authentication WPA Encryption algorithms MAC filtering

MAC filtering

You are a network administrator, and you want to verify that a cable is properly conducting electricity so that its signal can travel unimpeded from one node on a network to another. Which of the following tools would you use to identify this while setting up the network segment? Tone locator Multimeter Continuity tester OPM

Multimeter

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario? Channel bonding MIMO OFDMA MU-MIMO

OFDMA

Which of the following tools measures the amount of light power transmitted on a fiber-optic line? Multimeter Tone generator Tone locator OPM

OPM

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation. Order a switch with the current demand number Order switches that allow upgradeable interfaces Order media convertors Use APC ferrules

Order switches that allow upgradeable interfaces

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming. RDP Remote desktop gateway SSH Telnet

RDP

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots? TDM STDM FDM WDM

TDM

The IT department at Zatar Airways has complained of a faulty fiber-optic cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected? TDR Tone locator Tone generator OPM

TDR

Which of the following protocols is not a terminal emulation protocol? Telnet SSH Remote Desktop TFTP

TFTP

Which of the following protocols transfers files without any authentication or security? VPN FTPS SFTP TFTP

TFTP

Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement? Remote file access FTPS VPN Terminal emulation

Terminal emulation

Which of the following layer's header identifies the IP address of the destination host? The physical layer The transport layer The data link layer The network Layer

The network Layer

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check? Data Sequence Control Trailer Frame Control

Trailer

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath? Coaxial cable STP cable UTP cable Twinaxial cable

UTP cable

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue. Use Geofencing security technique Establish a guest network with a separate SSID Use wireless client isolation Use captive portal

Use Geofencing security technique

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network? Remote Desktop Protocol Terminal emulator Remote file access VPN

VPN

Which of the following security threats involves an interception of the network keys communicated between clients and access points? WPA attack WPS attack War chalking War driving

WPA attack

The Embassy of New Zealand has hired you to set up some patch cables that are to be used at its immigration office. What color wire will you insert into the third pin of an RJ-45 plug in such an establishment? White/green White/orange Brown Blue

White/orange

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation? aptive portal Spectrum analyzer RADIUS Wi-Fi analyzer

Wi-Fi analyzer

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved? Wireless range extender Signal propagation FHSS RSSI

Wireless range extender

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario. Encryption protocol mismatch Incorrect passphrase Wrong SSID Long AP association time

Wrong SSID

Monica, a network engineer at J&K Infotech Solutions, has been contracted by a small firm to set up a network connection. The requirement of the network backbone for the connection is of a couple of switches needing fiber-optic connections that might be upgraded later. Which of the following transceivers should Monica use when the maximum transmission speed is of 8 Gbps? SFP XFP SFP+ QSFP

XFP

As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action? arp -d arp -s arp -a IHL

arp -d

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC. netstat traceroute tcpdump arp

netstat

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network? ping tcpdump netstat nmap

nmap

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters? Question 119 options: One hop Two hops Three hops Four hops

one hops

Which of the following utilities is also known as a packet sniffer? ping netstat traceroute tcpdump

tcpdump

What is the frequency range for Bluetooth communication? 300 GHz-300,000 GHz 1850 MHz-1990 MHz 5.1 GHz-5.8 GHz 2.4 GHz-2.4835 GHz

2.4 GHz-2.4835 GHz

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue. 2.457 GHz 2.4 GHz-2.4835 GHz 5.925 GHz-7.125 GHz 300 GHz-300,000 GHz

5.925 GHz-7.125 GHz

Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement? 100GBASE-T 10BASE-T 100BASE-TX 10GBASE-T

100GBASE-T

Identify the core of an RG-6 coaxial cable. 20 AWG 22 AWG 28 AWG 18 AWG

18 AWG

Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario? Barney should use VDI (Virtual Desktop Infrastructure). Barney should use RDP (Remote Desktop Protocol). Barney should use SSH (Secure Shell). Barney should use Telnet.

Barney should use VDI (Virtual Desktop Infrastructure).

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario Geofencing Guest network Captive portal Wireless client isolation

Captive portal

Mr. Furland was hired as a network engineer at Secret Eye Corporations that is running a security camera outlet. While setting up a camera at one of the sites, he notices that the security camera has been mounted really high as a result of which there are no power receptacles to power up the device. So, Mr. Furland plans on powering these devices using an Ethernet cable. Which category of cable should he choose to power up the device? Cat 3 Cat 5 Cat 4 Cat 7

Cat 7

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario? Cat 5e Cat 5 Cat 6 Cat 7

Cat 7

An Internet Service Provider has hired you to frame cables for a network connection using TIA/EIA standards so that it can transmit up to 10 Gbps or 40 Gbps at short distances. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes? Cat 7a Cat 7 Cat 8 Cat 6e

Cat 8

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error. Sequencing Checksum Flow control Source port

Checksum

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels. WDM FDM TDM DWDM

DWDM

What is a small file containing verified users' identification information and public key known as? Digital certificate Public-key infrastructure Asymmetric encryption Key pair

Digital certificate

Mr. Walker plans on manufacturing a new line of twisted-pair cables for Ethernet Networks. To do so and to compete with the other brands circulating in the market, he has to get his cable qualified as per certain standards. Which of the following points should he emphasize to get his cable TIA/EIA certified? Twist ratio Effective throughput Minimal crosstalk Less attenuation

Effective throughput

You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case? TDM STDM FDM WDM

FDM

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?. TFTP FTPS SFTP RDP

FTPS

You are working as a network administrator for an ISP. You receive a complaint about fluctuations in the network speed despite using a fiber-optic cable. On checking the situation, you are of the opinion that you will need to cut a clean slice through the fiber strands. Which of the following kits should you carry for this purpose? Fiber stripper Fiber cleaver Fusion splicer Cable crimper

Fiber cleaver

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue? He should check for guest network preferences. He should check if the antenna has been misplaced. He should check whether captive portal user reminders have been set up. He should check whether the geofencing security option has been enabled.

He should check whether captive portal user reminders have been set up.

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device? IBSS BSS ESS ESSID

IBSS

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages. Version Fragment offset Flags Identification

Identification

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation? 802.11g 802.11a 802.11n 802.11ax

802.11ax

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band? 802.11b 802.11a 802.11ac 802.11ax

802.11ax

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps? Question 12 options: 802.11b 802.11a 802.11n 802.11ax

802.11b

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario. Attenuation Fading Interference Refraction

Attenuation

Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met? Split tunnel VPN Site-to-site VPN Host-to-host VPN Full tunnel

Split tunnel VPN

Which of the following remote access methods allows a remote client to take over and command a host computer? RAS Remote file access Terminal emulation VPN

Terminal emulation

Tim has been contracted to install a wireless connection at the head office of Travis Roadways. The head office is located in between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI (received signal strength indicator) level required for Tim to establish the connection functional as per the requirements. The RSSI level should at least be -80 dBm. The RSSI level should at least be -90 dBm. The RSSI level should at least be -50 dBm. The RSSI level should at least be -70 dBm.

The RSSI level should at least be -50 dBm.

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way? The third bit The first bit The second bit The fourth bit

The third bit

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network? ICMP TCP UDP IP

UDP

Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances. Use the EAP-TLS encryption to protect communications Use PEAP as it is tunnel-based Use EAP-MSCHAPv2 Use EAP-FAST via Secure Tunneling

Use the EAP-TLS encryption to protect communications

Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue? Use traceroute or tracert to track down the malfunctioning routers Use ping to test for network connectivity Use tracert to target a node instead of the router Use Mac spoofing

Use tracert to target a node instead of the router

Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company's data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation. L2TP OpenVPN GRE mGRE

mGRE

Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports? netstat -a netstat -f netstat -n netstat -r

netstat -a

You are running the netstat command to list all active TCP/IP connections of the local machine. However, you now want to have access to the routes used by the network hosts to reach the particular network destinations. Which of the following commands will you apply in such a situation? netstat -n netstat -r netstat -f netstat -b

netstat -r

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here. Noise Attenuation RTT Jitter

Jitter

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs. In-band management Out-of-band management Telnet SSH

Out-of-band management

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario? PEAP EAP-TLS EAP-FAST EAP-MSCHAPv2

PEAP

As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation? Protocol Option Padding Data

Padding

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation? Port 20 Port 22 Port 69 Port 989

Port 22

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information? Data Sequence Control Trailer Frame Control

Sequence Control

You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network? Full-duplex Half-duplex Simplex RTT

Simplex

Saved Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity? Remote wipe Trusted access OS update requirements Site survey

Site survey

JW Communications has hired you to install a Wi-Fi network on its floor. To provide a seamless network connection, you have decided to install a centralized wireless controller to manage AP redundancy by directing wireless traffic to alternate APs when an AP fails. Which of the following protocols will you apply in order to direct all the wireless frames to the controller? ICMP LWAPP POP3 EAP

LWAPP

Which of the following is not a characteristic of fiber cable? Low cost Throughput Noise immunity Size

Low cost

Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver's end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client's device's RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario. Question 6 options: Mark the rating as excellent Mark the rating as good Mark the rating as acceptable Mark the rating as not good

Mark the rating as not good

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable? Tone generator Media converter Fiber transceiver Fiber connector

Media converter

While programming an IP packet, Kiara, a network programmer, gets to know that the packet has not reached the destination and has been sent back because the allotted TTL has expired. Now, as the device was running on an IPv6 packet, analyze which of the following protocols should Kiara opt for so that such errors do not arise in the future? NDP ICMP ARP Ethernet

NDP

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use? Question 5 options: RFID ANT+ ZigBee NFC

NFC

What is the service that offers a central authentication point for wireless, mobile, and remote users called? WPA AES EAP RADIUS

RADIUS

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case? SFTP VPN RDP SSH

SSH

Which of the following multiplexing technologies would you use with fiber-optic cable? WDM FDM TDM STDM

WDM

You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation? Window size Header length Options Destination port

Window size

Which of the following transceivers supports up to 10 Gbps? SFP XFP QSFP SFP+

XFP


Ensembles d'études connexes

MIDTERM QUESTIONS for FINAL Exam

View Set

Chapter 5--Dr. Kass Test Daniella's version without multiple choice questions

View Set

Chapter 5 - Measuring a Nation's Income

View Set

CHAPTER 1 ACCT 202 COST CLASSIFICATIONS FOR DIFFERENT PURPOSES

View Set

chapter 41 drug therapy for diabetes mellitus, Pharmacology Chapter 41 Drug Therapy for Diabetes Mellitus

View Set

PSI - NY Life, Accident and Health Practice Exam 17-55, Just my cards + 199+ 75 ( TEST) (LOT)

View Set

Organizational Behavior Exam 2 Study Guide

View Set