Exam 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An administrator is upgrading the switches in the server room to support 10 Gbps of throughput. The switch will need to take advantage of the existing CAT6a lines that run to each server. What Ethernet standard should be used? 10GBaseSW 10GBaseFX 10GBaseT 10GBaseSR

10GBaseT CAT6a can reach speeds of 10 Gbps over 10GBaseT cables. The other cables listed are all fiber cables, and not CAT6a.

A company has a network with three switches, each one with eight ports. The switches are connected to a router that has a hub with four computers plugged into its interface ports. How many broadcast domains are in this network? 16 5 2 1 28

2 A broadcast domain is a logical division of a computer network in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment or it can be bridged to other LAN segments. Routers break up broadcast domains, therefore there are two broadcast domains in this network - one for each side of the router (three switches in one and the hub in the second).

A network administrator needs to allow employees to upload files to a remote server. What port should be allowed through the firewall? 20 161 21 23

21 Port 21 or FTP (File Transfer Protocol) is used to transfer files between computers and servers. If you needed to use secure file transfer, you would use port 22 (SFTP).

Host1's application generates a payload of 2500 bytes of data and sends it to Host2. When the application on Host2 receives the payload it will be: more than 2500 bytes due to encapsulation less than 2500 bytes due to decapsulation 2500 bytes in size

2500 bytes in size The payload is the data to be transmitted. The extra pieces added or removed during encapsulation are in addition to this payload size.

An organization is required to implement a wireless network. The organization must implement wireless routers compatible with 802.11ac protocol that have maximum possible range. What wireless router frequency is a viable option? 2.4GHz 5.0GHz 6.0GHz 3.7GHz

5.0GHz Wireless AC uses 5.0 GHz for wireless transmission, whereas Wireless B/G uses 2.4 GHz.

A company has decided to upgrade its legacy phone system to VoIP. The new phones will download the configurations from a TFTP server each time they boot up. What firewall port must be opened to ensure the phones can communicate with the server? 53 161 20 69

69 TFTP uses port 69 to communicate.

What should a technician upgrade to if the existing wireless standard only allows for three non-overlapping channels and more non-overlapping channels are needed? 802.1q 802.11g 802.11n 802.11b

802.11n Wireless b and g only support 3 non-overlapping channels (1, 6, 11), but Wireless n supports 5 GHz spectrum which provides dozens of non-overlapping channels.

A new network administrator is hired to replace a consultant that has been running the network for several months and whose contract was just cancelled. After a month of working on the network, the new network administrator realized there are some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem? A backdoor has been installed to access the network TACAS/RADIUS misconfiguration is causing logs to be erased The last ACL on the router is set to Deny All ICMP ping of death is resetting DHCP and DNS on the server

A backdoor has been installed to access the network A hacker or the previous administrator (consultant) left a piece of software or an SSH protocol to be able to allow themselves access to the network in order to change the server settings. The consultant may be disgruntled that their contract was cancelled and that the new network administrator was hired to replace them.

What requires the network administrator to schedule a maintenance window? A minor release upgrade of a production router a major release upgrade of a core switch in a test lab when a company-wide email notification must be sent

A minor release upgrade of a production router During an update of a production router, the router would not be able to route packages and the network traffic would be affected. It would be necessary to announce a maintenance window. A maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could cause disruption of service may be performed.

A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause? an evil twin was implemented The user is connected to a botnet A successful WPS attack has occurred The user is experiencing ARP poisoning

A successful WPS attack has occurred Successful WPS attacks happen when the default username/password etc. has not been changed or reconfigured on the router. If your default username/password hasn't been changed, anybody can get into the settings and open the network. This is why additional unknown devices are on the network.

What happens when convergence on a routed network occurs? all routers use route summarization All routers have the same routing table All routers learn the route to all connected networks all routers are using hop count as the metric

All routers learn the route to all connected networks Routers exchange routing topology information with each other by using a routing protocol. When all routers have exchanged routing information with all other routers within a network, the routers are said to have converged. In other words: In a converged network, all routers "agree" on what the network topology looks like.

What is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? Analog modem Access point Multilayer switch docsis MODEM

Analog modem An analog modem is a device that converts the computer's digital pulses to tones that can be carried over analog telephone lines, and vice versa. The other type of Internet connection that occurs over an RJ-11 (phone line) is DSL.

A system administrator wants to verify that external IP addresses are unable to collect software versioning from servers on the network. What should the system administrator do to confirm the network is protected? Analyze packet captures Utilize netstat to locate active connections Use nmap to query known ports Review the ID3 logs on the network

Analyze packet captures Captured packets show you the information that was travelling through certain files, etc. Packet sniffers detail the information they've received, so working through those would show if the external network shows or details software versions.

A firewall technician configures a firewall in order to allow HTTP traffic as follows: Source IP Zone Dest IP Zone Port Action Any Untrust Any DMZ 80 Allow The organization should upgrade to what technology to prevent unauthorized traffic from traversing the firewall? HTTPS Application aware firewall Stateless packet inspection IDS

Application aware firewall Application aware firewall can analyze and verify protocols all the way up to layer 7 of the OSI reference model. It has the advantage to be aware of the details at the application layer. Since we desired to allow HTTP traffic, we must deal with the traffic at the application layer.

A company wants to create highly-available datacenters. What will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at their own site goes down? VRRP Load Balancer OSPF BGP

BGP If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available.

What is used to proxy client requests for IP configurations across different network segments? DHCP relay teredo tunneling SOCKS reverse proxy

DHCP relay A DHCP client is an Internet host using DHCP to obtain configuration parameters such as an IP address. A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay agents are used to forward requests and replies between clients and servers when they are not on the same physical subnet.

A company suffers an outage due to a bad module in a core switch. What is the FIRST step to conduct in troubleshooting? Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat gather information, start at the top of the OSI model, and work down Establish a plan of action to solve the problem Gather information, start at the bottom of the OSI model, and work up.

Establish a plan of action to solve the problem The first step is to establish a plan of action to resolve the problem and identify potential effects.

A network technician is replacing a client's security devices which protect their DMZ. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application. What is likely misconfigured and causing a problem? DNS Firewall DHCP Content filter

Firewall A firewall is an integral part of a DMZ. If configured correctly, it can regulate exactly what traffic and users are allowed to access the server. This is different from a content filter because a content filter simply denies traffic to a user based on content, but not access to a server. If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to "deny by default".

Which of the following would be the BEST addition to a business continuity plan to protect the business from a catastrophic disaster such as a fire, tornado, or earthquake? Hot sites or cold sites UPS and battery backups building generator Fire suppression system

Hot sites or cold sites Although all answers are adequate suggestions to aid in business continuity, the addition of a hot or cold site is the BEST option. A hot or cold site is a commercial service that provides all equipment and facilities to allow a computer or networking company to continue operations in the event of a catastrophic event. In the case that the building has been destroyed, the hot/cold site is the only option that will allow the business to continue their operations effectively.

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. What is the QUICKEST option to configure a replacement switch? Syslog Image Archive Baseline

Image The baseline is only to give you an idea on how it works before any changes are made. The archive won't explain much and syslog is a windows feature. Process of elimination shows that an image would work best. To image a switch, you can make a backup of the configuration and deploy it to a new/different switch.

What transmission method is used for network utilizing the 802.3 standard? Synchronus DSSS MAC Baseband Broadband

MAC Media Access control (MAC) is used for wired Ethernet data links. 802.3 is the standard for Ethernet networks.

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the Internet via the kiosk's wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk? Host-based antivirus Firewall MAC filtering Web filtering

MAC filtering MAC Filtering will control access to the network by restricting access to only certain devices.

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. What needs to be added to allow the network management tool to interpret the new device and control it using SNMP? GET WALK TRAP MIB

MIB Management Information Base (MIB) is used for managing all entities on a network using Simple Network Management Protocol. It would allow whatever tool to correctly interpret the information received.

A user reports slow performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: Avg. % Processor Time = 15% Avg. Pages/Second = 5 Avg. Disk Queue Length = 1 Based on these results, what is the issue? Memory NIC Processor Hard drive

Memory The processor reads data based on how much RAM is in a system. If it takes longer to access certain things, adding more RAM could help the processor work at a higher rate of speed. The Average Pages/Second at 5 is considered high in most cases, so additional RAM should be added to the machine.

Tim is a network administrator who is setting up three additional switches in his test lab. While configuring the switches, he is verifying the connectivity but finds that when he pings one of the switches using its IP address, he receives "Destination Unreachable". What kind of issue is this? DoS attack Misconfigured DNS settings Misconfigured Split Horizon RADIUS authentication errors

Misconfigured Split Horizon Split horizon is a method of preventing a routing loop in a network. If it is misconfigured, the switches would be unable to communicate with each other. None of the other answers provided would prevent communication between the switches.

What network infrastructure implementations would be used to connect two remote sales machines back to the main campus for all data and voice traffic? Multimode fiber (MMF) MPLS Satellite Crossover cable

Multimode fiber (MMF) Multimode fiber can carry different types of data signals over short distances without losing any integrity. A crossover cable maxes at 300ft (cat5e) satellite works over line of sight technology and sometimes the signal isn't great, and MPLS is based on a short path rather than a long path.

While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high. What should the network technician utilize to verify if this is a concern? Network diagram Real-time monitor Network baseline Log management

Network baseline High network traffic can be a sign of a possible attack conducted either by an insider or someone out of the network to steal relevant information. By reviewing the network baseline, the network technician can determine if the traffic is actually high and if any configurations of the network are out of baseline causing the issue.

It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than the others on the network. What is this an example of? Network device CPU issues Network device power issues SAN issues Delayed responses from RADIUS

Network device CPU issues Routing decisions must be processed by the router, which relies on the networking device's CPU.

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform? Network-based anti-malware Host-based anti-malware Cloud-based anti-malware Signatrue based anti-malware

Network-based anti-malware The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.

What concept is the MOST important for a company's long-term health in the event of a disaster? Implementing an AUP Offsite backups UPS Vulnerability scanning

Offsite backups In case of a disaster, you must protect your data. Some of the most common strategies for data protection include backups made to tape and sent offsite at regular intervals.

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, what should the technician do to prevent the password from being sniffed on the network again? ensure the password is 10 characters, containing letters and numbers Only allow administrators to access routers using port 22 Copy all configurations to routers using TFTP for security Use SNMPv1 for all configurations involving the router

Only allow administrators to access routers using port 22 Port 22 uses SSH to authenticate a remote computer or user, or in this case, an administrator. Even if the router has been compromised, the new full rights user would not be able to access their new account without the SSH key, which could only be provided by a true administrator. Telnet uses port 23 and passes all information as unencrypted traffic on the network. Telnet should always be disabled for security reasons and SSH (which uses encryption) should be used instead.

A network technician needs to monitor the network to find a user that is browsing websites that are against the company policy. What should the technician use to view the website and find the user browsing it? Packet sniffer SNMP GET Top listener tool IDS

Packet sniffer Packet Sniffers can capture and analyze network user traffic. This information can be queried to view website addresses, contents, and sometimes even the password information. This differs from an intrusion detection system in that IDS' wait to receive implicitly-malicious data in a network prior to logging the event.

An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. What cloud services is the administrator using? Private Iaas Public Iaas Hybrid Saas Community PaaS

Public Iaas Infrastructure as a Service (IaaS) is the foundation of cloud computing. Rather than purchasing or leasing space in expensive datacenter, labor, real estate, and all of the utilities to maintain and deploy computer servers, cloud networks, and storage, cloud buyers rent space in a virtual data center from an IaaS provider. They have access to the virtual data center via the Internet. This type of cloud computing provides the "raw materials" for IT, and users usually only pay for the resources they consume, including (but not limited to) CPU cores, RAM, hard disk or storage space, and data transfer. Since this cloud provider is available to all companies to use, much like Microsoft Azure or Amazon Web Services, this is an example of a Public IaaS or Public Cloud.

The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration? RADIUS FTP DNS Kerberos

RADIUS RADIUS is used to centrally manage credentials for network devices. TACACS is an older username and logon system that uses authentication to determine access, while RADIUS combines authorization AND authentication. For this question, either RADIUS or TACACS would be an acceptable answer.

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. What type of monitoring should be put in place? NIDS SMS SMTP SNMP

SNMP The keyword is MONITORING. SNMP stands for Simple Network Management Protocol. SMTP is simple mail TRANSPORT protocol. NIDS is network intrusion detection system SMS is short message service. So, knowing what all of them stand for helps you to understand if the goal is simply to manage the server and send alerts from client to server. Based on these information, SNMP is the best choice.

An end user receives a new computer and now is unable to connect to a database using ODBC. Other users are able to connect successfully, and the network technician is able to successfully ping the database server but still is unable to connect. What might have caused this issue? Missing IP routes on router Wrong default gateway address Failing NIC Software firewall is blocking ports

Software firewall is blocking ports A change in the firewall settings to allow access to the specified ports will fix the problem. It appears the default firewall on this new computer is blocking the port used to communicate with the database server. Open Database Connectivity (ODBC)

A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments in the rack. What is the likely cause of the problem? The bend radius of the cable has been exceeded The OC3 was improperly provisioned The cable was improperly crimped The new OC3 cable is experiencing EMI

The bend radius of the cable has been exceeded A fiber cable (like an OC3) should not be bent more than 45 degrees or it will break the connection.

A network administrator is configuring one distribution and five access switches which will be installed in a new building. What is the BEST physical location for the equipment? All switches should be placed in the MDF to leave room in the IDF for servers All switches should be placed in the IDFto leave room in the MDF for servers The distribution switch in the MDF and access switches in the IDF The distribution switch in the IDF and access switches in the MDF

The distribution switch in the MDF and access switches in the IDF Distribution switches should be placed in the Main Distribution Facility (MDF) and the access switches would be placed in the IDF closer to the end users.

An employee of a highly-secure company needs to use facial recognition in addition to username/password to successfully establish a VPN. What BEST describes this methodology? federated identity PKI Biometric authentication Two-factor authentication

Two-factor authentication This would classify best as two-factor authentication, since it requires "something you are" (face) and "something you know" (username/password) for successful authentication to occur.

A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building? Use different SSIDs on different channels and VLANs Use the same SSIDs on different channels and AP isolation Use different SSIDs on the same channels with VLANs Use the same SSIDs on same channels with AP isolation

Use the same SSIDs on different channels and AP isolation For users to be able to seamlessly migrate between the two buildings, both Access Points (AP) must use the same SSIDs. They must be on different channels though. Otherwise, interference could occur. Access Point (AP) isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.

A network technician has just received an email regarding a security issue detected on the company's standard web browser. What will MOST likely fix the issue? Vulnerability patch driver update OS update firmware update

Vulnerability patch

Your network security manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, or other essential security feature, as well as its risk severity. What solution would work best to find this data? Virus scan Security policy penetration scan Vulnerability scan

Vulnerability scan A vulnerability scanner is a computer program designed to assess computers, computer systems, networks, or applications for weaknesses. Most vulnerability scanners also create an itemized report of their findings after the scan.

A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. What should the technician check FIRST during troubleshooting? Encryption type WAP SSID WAP placement Bandwidth saturation

WAP placement For optimal network performance, the placement of the Wireless Access Point (WAP) guidelines should be taken into consideration to ensure that the building's construction doesn't cause interference with the wireless signals.

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented? WPA personal MAC filtering WPA2 enterprise WEP

WPA personal Since he wishes to use a pre-shared key and not require an authentication server, the most secure choice is WPA personal. WPA2 Enterprise is actually a more secure choice, but it requires a RADIUS authentication server to be used.

A network administrator needs to install a centrally-located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. What firewall type should the administrator install? a stateful network-based firewall a stateless network-based firewall a host-based stateful firewall a host-based firewall

a stateful network-based firewall A stateful firewall enhances security through the use of packet filtering and these types of firewalls also keep track of outbound requests and open the port for the returning traffic to enter the network.

The network technician has received a large number of complaints from users that there is poor network performance. The network technician suspects a user may have created a malicious flood on the network with a large number of ping requests. What should the technician do? block all ICMP requests update all the antivirus software remove all suspected users from the network upgrade firmware on all network cards

block all ICMP requests Ping requests use the Internet Control Message Protocol to send operational information about a host or router. Blocking all ICMP requests would eliminate the ping request flood, although it may become harder to diagnose network issues in the future as ICMP is used heavily in network troubleshooting.

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is in the works. What should the administrator do to mitigate this risk? downgrade the server and defer the new feature testing utilize WAF to restrict malicious activity to the internet server enable HIPS to protect the server until patch is released enable the host-based firewall on the internet server

downgrade the server and defer the new feature testing Since the vendor stated that the new version introduces vulnerabilities in the environment, it is better to downgrade the server to the older and more secure version until a patch is available.

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation? data transport first responder encryption eDiscovery

eDiscovery Process of elimination: Data transport is the transport of data while the First responder is the "first responder" and encryption is a method of putting data into a tunnel so it's completely secured. That leaves us with eDiscovery.

An administrator's router with multiple interfaces uses OSPF. When looking at the router's status, it is discovered that one interface is not passing traffic. Given the information below, what would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is down Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 0 packets output, 0 bytes 0 output errors, 0 collisions, 0 resets replace the line card enable the connection port put the IP address in the right broadcast domain set the loopback address set the OSPF to area 0

enable the connection port Since the line protocol is down, you will need to enable the connecting port to restore the connection.

An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. What is MOST likely being implemented at the site with less issues? end-user awareness training vulnerability scanning consent to monitoring business continuity measures

end-user awareness training Users should have security awareness training and should have accepted and signed acceptable use policy (AUP) agreements. User awareness training is one of the most significant countermeasures the company can implement.

A technician is helping a SOHO determine where to install the server. What should they consider first? cable length equipment limitations environmental limitations compatibility requirements

environmental limitations SOHO stands for Small Office / Home Office. A SOHO network is typically a small network. Being a small network, it is unlikely that it will have a datacenter or even a dedicated server room. Therefore, they should consider the environmental limitations (power, space, and cooling) first.

A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. What type of media would be the BEST to meet this requirement? fiber optic cable CAT5e cable CAT3 cable Coax cable

fiber optic cable To achieve 10 Gbps, you should use CAT 6a or a fiber cable. Since CAT6a isn't an option, fiber is the best answer here. CAT 5e can only operate up to 100 meters at 1 Gbps of speed.

A client is concerned about a hacker compromising a network in order to gain access to confidential research data. What could be implemented to redirect any attackers on the network? Honeypot Content filter DMZ Botnet

honeypot A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data that appears to be a legitimate part of the site, but is actually isolated and monitored, and seems to contain information or a resource of value to attackers, who are then blocked.

What Ethernet feature will allow increased FCoE network throughput as long as all network devices recognize its specific size? frame relay jumbo frame equal cost multipath QoS TCP offloading

jumbo frame By allowing jumbo frames, network throughput can be increased.

What is the network topology in which all nodes have point to point connections to all other nodes known as? Bus Mesh Star Ring

mesh A mesh network is a network topology in which each node relays data for the network.

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. What could the technician implement to meet this requirement? Honeynet quarantine high availability MAN network

quarantine Quarantine is where devices that do not meet the standards for the regular network can be placed. In this area, they can be checked before connecting to the main network.

A network architect is designing a highly-redundant network with a distance vector routing protocol in order to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize? hold down timers split horizon spanning tree route poisoning

route poisoning The Route poisoning setting in Cisco's Split Horizon is what prevents routing loops and shows the failed routes.

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. What action could the administrator take to improve the performance of data transfers over iSCSI switches? the administrator should set the MTU to 9000 on each of the participants in the vSAN the administrator should configure the switch ports to auto-negotiate the proper Ethernet settings The administrator should configure each vSAN participant to have its own VLAN The administrator should connect the iSCSI switches to each other over inter-switch links (ISL)

the administrator should set the MTU to 9000 on each of the participants in the vSAN When using an iSCSI SAN (with iSCSI switching), we can improve network performance by enabling 'jumbo frames'. A jumbo frame is a frame with an MTU of more than 1500. By setting the MTU to 9000, there will be fewer but larger frames going over the network. Enabling jumbo frames can improve network performance by making data transmissions more efficient.

A network administrator is comparing several different wireless technologies. To calculate the effective maximum file transfer rate instead of the theoretical, what should be measured? goodput latency throughput bandwidth

throughput Throughput is the measurement of the maximum amount of data that is able to be sent over a transmission path.

What is used to define how much bandwidth can be used by various protocols on the network? traffic shaping high availability load balancing fault tolerance

traffic shaping Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users.

A network technician has just run a new point-to-point fiber link between two local routers. After the fiber has been plugged in on both ends, the interface will not come up. The network technician has double-checked the interface configuration on both routers, both SFPs have been hard-looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient power. What is the cause of the problem? Duplex mismatch Wrong IP address Wavelength mismatch Distance limitations

wavelength mismatch Wavelength mismatch is when two different transmitters at each end of the cable have either longer or shorter wavelengths. Both transmitters have to be identical on each end of the cable.


संबंधित स्टडी सेट्स

Chapter 2: Physical Quantities and Measurements

View Set

Pavement Markings & Traffic Signals (Chapter 5)

View Set

AUD - CPA Exam - Accounting and Review Services

View Set

Knee: AP Oblique Projection Lateral rotation

View Set

Unit 1 -- Entrepreneurial Search

View Set

Year 1 Semester 1 Final - WCP AM

View Set