Final Answers Networking CSC130

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

IBSS

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network?

ICMP

Which of the following institutions assigns a manufacturer's OUI?

IEEE

Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host?

IPS

Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?

Retransmission policy

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as?

Rollback

What is the maximum allowable distance for horizontal cabling?

100 m

What is the correct CIDR notation for the subnet mask 255.255.255.0?

/24

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87?

10.43.3.87:23

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

14

Which of the following addresses can be identified as an APIPA address?

169.254.0.1

Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting?

191.254.1.29

What is the broadcast address for the subnet 192.168.0.64 /26?

192.168.0.127

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?

62

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address?

192.168.50.118

What is the frequency range for Bluetooth communication?

2.4 GHz-2.4835 GHz

What is the highest decimal number that 8 bits can represent?

255

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

255.0.0.0

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

255.254.0.0

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

255.255.240.0

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use?

255.255.255.224

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.224

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function?

3

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

30

What is the secure port for HTTPS?

443

How many host are available using the subnet mask 255..255.255.192?

62

How many bits are used in a network with a subnet of 255.0.0.0?

8

How many network would be available using CIDR notation /27?

8

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

802.11b

Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time?

Bandwidth

Identify which of the following statements is Correct.

A 32-bit IPv4 address is organized into four groups of 8 bits each.

Which of the following manages the dynamic distribution of IP addresses to devices on a network?

A DHCP

Which of the following is a distinct network of storage devices that communicate directly with each other and with other portions of the network?

A SAN

Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files?

A disaster recovery plan

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?

A layer 3 switch

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?

A load balancer

Which of the following switches can be configured via a command-line interface or a web-based management GUI (graphical user interface)?

A managed switch

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

A more negative RSSI value indicates a higher quality of signal.

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?

A network operating system is much more expensive than a desktop operating system.

The administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address?

A private port number

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.

A star topology

Must Eat is a company that allows online food delivery. Must Eat rolls out updates every month for better user interface. Recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. On inspection, the team notices that there has been no breach of sensitive data. What kind of cybersecurity exploitation was attempted by the hackers in this scenario?

A zero-day attack might have been the cause.

Which one of the following DNS record types holds the name-to-address mapping for IPv6 addresses?

AAAA records

Which of the following will act as a filter to instruct the router to permit or deny traffic from travelling through the network?

ACL

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

Ethernet

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?

AUP

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender?

Acknowledgment number

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers?

Active Directory

Which of the following is not a technique used in a closed-loop response to an existing congestion?

Admission policy

Which of the following statements stands true?

An email can be downloaded to the client computer using POP3.

Beevan works as a network analyzer for an ISP. The network manager has asked him to use a protocol for the routers that can scan beyond the home territory and can instruct a group of routers to prefer one route over other available routes. Analyze which of the following should be used in this scenario.

BGP

Which of the following devices scans an individual's unique physical characters such as iris color patterns to verify the person's identity?

Biometrics

In which of the following modes will a vNIC access a physical network using the host machine's NIC?

Bridged mode

Which of the following power flaws is also called a sag?

Brownout

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

CNAME record

Which of the following steps of an incident response plan includes the act of limiting the damage by the team, where affected systems or areas are isolated, and response staff are called in as required by the situation?

Containment

You have been getting complaints about slow speed from one of your clients. You decide to visit the site to have a look, and you notice that the RJ-45 connector has been tampered with as a result of which there are network fluctuations. These fluctuations are taking place as the pins in the connectors are bent. Which of the following tools will you use to push the pins inside the RJ-45 connector?

Cable crimper

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

Captive portal

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Cat 6a

Mr. Furland was hired as a network engineer at Secret Eye Corporations that is running a security camera outlet. While setting up a camera at one of the sites, he notices that the security camera has been mounted really high as a result of which there are no power receptacles to power up the device. So, Mr. Furland plans on powering these devices using an Ethernet cable. Which category of cable should he choose to power up the device?

Cat 7

An Internet Service Provider has hired you to frame cables for a network connection using TIA/EIA standards so that it can transmit up to 10 Gbps or 40 Gbps at short distances. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Cat 8

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Checksum

Which of the following methods requires the entry of a code to open a door?

Cipher lock

Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network?

Congestion control

You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario?

DAI

Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

DRDoS attack

Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

Data VLAN

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization?

Default VLAN

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

Diffraction

What is a small file containing verified users' identification information and public key known as?

Digital certificate

Which of the following is not a social engineering strategy?

DoS

Silicone Printers has raised a ticket claiming that it was unable to view websites from its workstations, because with every attempted access, the system displayed an error message that read "there is another device using the same IP address." What would you, as a network engineer, check for in such a scenario?

Duplicate IP addresses

Which of the following ports range from 49152 to 65535 and are open for use without restriction?

Dynamic and private ports

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administrator to determine the best solution to this problem. Which type of routing path will you use to solve this problem?

Dynamic route

Identify which router connects an autonomous system with an outside network, also called an untrusted network.

Edge router

Which of the following refers to any router outside an organization's AS(autonomous system), such as a router on the Internet backbone?

Exterior router

The IT department of Mascom Telecom has requested you to fix an error that seems to have been associated with a possible malware attack. This particular malware file seems to have attacked the operating system files on the computer. Which of the following should you use to avoid or alert such an attack in the future?

FIM

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Fading

Jasper Infotech have an issue with their network system-a malfunctioning NIC on a router caused network outages. They have hired you specifically to ensure that the network system does not collapse when there is an unexpected hardware or software malfunction. Which of the following terms will you refer to while fixing this issue for Jasper Infotech?

Fault tolerance

Which of the following technologies selectively filters or blocks traffic between networks?

Firewall

Which of the following is an optional server that receives queries from local clients but doesn't work to resolve the queries?

Forwarding DNS server

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

Four bits

Which of the following cabling methods connects workstations to the closest data rooms?

Horizontal cabling

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

Hypervisor

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing?

Incorrect DNS

Which of the following backs up only the data that has changed since the last backup?

Incremental backup

You are hired as a network administrator to monitor an organization's network status on an ongoing basis and to make changes to best meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that one of the modems is repeatedly power cycling to reset network activity. Which of the following KPIs will help you in getting a better understanding of the situation?

Interface statistics

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud?

Internet

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here.

Jitter

Which of the following issues keys to clients during initial authentication?

KDC

What other technical name or PDU can be used to represent the session presentation and application layer?

L7PDU

JW Communications has hired you to install a Wi-Fi network on its floor. To provide a seamless network connection, you have decided to install a centralized wireless controller to manage AP redundancy by directing wireless traffic to alternate APs when an AP fails. Which of the following protocols will you apply in order to direct all the wireless frames to the controller?

LWAPP

To ensure better security measures for the computers used in your organization, you, as a network administrator, have decided to update the passwords of each computer on a weekly basis. But managing and changing the passwords for all the computers is a tiresome task. Hence, you decide to apply a security measure with the help of a password management software. Which of the following software will you use in this scenario?

LastPass

Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload?

Layer 4

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario.

Layer 4 switches

Which of the following is not a characteristic of fiber cable?

Low cost

Which authorization method grants access to a user when the user's classification and category match those of a resource?

MAC

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination.

MAC address

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?

MDF

Identify which of the following designations can be associated with a member who coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation?

Manager

Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?

Measured service

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable?

Media converter

Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes?

Metasploit

You are a network administrator, and you want to verify that a cable is properly conducting electricity so that its signal can travel unimpeded from one node on a network to another. Which of the following tools would you use to identify this while setting up the network segment?

Multimeter

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?

NIC teaming

Which of the following protocols is used to synchronize clocks on computers throughout a network?

NTP

Which of the following VLANs receives all untagged frames from untagged ports?

Native VLAN

You, as a network engineer, want to have an insight into your network's weaknesses that need attention. You want to search for devices with open ports indicating which insecure service might be used to craft an attack and identify unencrypted sensitive data. Which of the following scanning tools will you use in this scenario?

Nessus

Which of the following monitors network traffic and might receive data from monitored devices that are configured to report their statistics?

Network monitor

Which of the following tools measures the amount of light power transmitted on a fiber-optic line?

OPM

Which of the following IGPs supports large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops?

OSPF

In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?

On-path attack

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

Out-of-band management

You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation?

PAM

Which of these DoS (denial-of-service) attacks damages a device's firmware beyond repair?

PDoS

As a developer, you need frequent access to multiple platforms during the development process. Rather than purchasing and maintaining a separate device for each platform, you have decided to avail the cloud service option. You are looking to build and test the applications within these virtual, online environments, which are tailored to the specific needs of the project. The cloud service model should have servers that provide only the resources needed to run an application and also allow customers to run their code directly in the cloud without having to manage a server environment at all. Which of the following cloud service models do you think would be appropriate considering your requirements?

PaaS

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario?

Plenum-rated cable

In which of the following phases of the social engineering attack cycle will an attacker require the most time investment?

Research

Riverview Union High has contacted you to establish a secure communication over the computer network by encrypting the communication protocol using the SSL. Which of the following registered ports will you use to secure the connection?

Port 443

Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

Port mirroring

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

Presentation layer

Which of the following cloud models makes resources available to users through a WAN connection?

Private cloud

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

Resolvers

At a security training exercise, you had to devise a strategy to penetrate into an organization's data room by accessing one of their employee's ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?

Quid pro quo

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

RADIUS

You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand?

RAID

Which authorization method allows a network administrator to receive from a user's supervisor a detailed description of the roles or jobs the user performs for the organization?

RBAC

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

RDP

You are working as a technical specialist for an ISP. The network administrator has asked you to set up a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use?

RIPv2

Which of the following protocols can detect and correct link failures in milliseconds?

RSTP

You are an employee for Asianet Solutions, which is an ISP. Rickwell Infrastructures has hired Asianet Solutions to establish a network connection in its organization. You have been sent to its office to stack up the routers, servers, and switches. Which of the following options would you use in such a scenario?

Rack

You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?

Rapid elasticity

Which of the following steps of an incident response plan involves the process of repairing affected systems and putting them back in operation to ensure the smooth running of operations?

Recovery

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer?

Rollover cable

You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available so that the path to the destination can be shortened. Which of the following will help you in doing so?

Routing cost

What is an Ethernet packet that is smaller than 64 bytes called?

Runt

Which of the following consists of high capacity data storage devices in a distinctly defined network segment?

SAN

Which of the following versions is the most recent iteration of SHA (Secure Hash Algorithm), which was developed by private designers for a public competition in 2012?

SHA-3

Which of the following will you use to monitor and analyze data stored in logs?

SIEM

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project?

SMF

Which of the following protocols is used to send an email message to the first server?

SMTP

An organization determined that there was an increase in network latency, and it approached you, a network administrator, to solve the issue. You decide that the extra demand on the network device's CPU and memory should be lessened to solve this issue. You also plan on getting a comprehensive view of the network traffic and sample traffic as well. Which of the following will you use in this scenario?

SNMP

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case?

SSH

The 3-2-1-1 Rule defines backup principles to follow to reliably recover lost data under a wide variety of adverse conditions. What does the "2" in the second part of the principle denote?

Save backups on at least two different media types

Which of the following is a device or an application that stores or generates information known only to its authorized user?

Security token

Which of the following anti-malware software will slow down your network performance considerably?

Server-based

You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network?

Simplex

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

Site survey

Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources?

SoD

Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections?

Stateless firewall

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

Static VLAN assignment

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

Which power device prevents momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?

Surge protector

Which of the following can capture all traffic traversing a network connection?

TAP

Which of the following protocols is not a terminal emulation protocol?

TFTP

Which of the following protocols transfers files without any authentication or security?

TFTP

Which of the following is used to issue tickets to an authenticated client for access to services on the network?

TGS

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

The Network Layer

You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network?

The core layer

Which of the following layer's header identifies the IP address of the destination host?

The network Layer

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model?

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

What is help desk software used for?

To document problems and their resolutions

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

Trailer

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

Transmission Control Protocol

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario?

Trunking

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?

UDP

Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath?

UTP

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath?

UTP cable

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Unicast address

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique

Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue?

Use tracert to target a node instead of the router

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

VLSM

What should be the ideal procedure after implementing the solution to a network troubleshooting problem?

Verify functionality and implement preventive measures.

You, as a network administrator, plan on running a trial for a beta version of an application. The idea is to install the application on a guest machine. You plan on doing this because you would rather have the untested software cause errors on the guest machine than on the host. Which of the following will you use in this instance?

VirtualBox

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Which of the following traverses a significant distance and usually supports very high data throughput?

WAN

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

WPS attack

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

Well-known ports

In which of the following do the bits work opposite of how bits in a subnet work?

Wildcard mask

You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

Window size

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

Wrong SSID

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____.

a router-on-a-stick

The process of designing, implementing, and maintaining an entire network is called _____.

a system life cycle

Which of the following commands is used to assign a statement to an ACL on Cisco routers?

access-list

A system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events is called _____.

an audit trail

As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action?

arp -d

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

classless addressing

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?

iSCSI

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

ipconfig

Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports?

netstat -a

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?

nmap

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running?

ping 127.0.0.1

You are working as a network engineer at Krofter Securities. The organization uses Cisco's Linux OS in all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario?

route

Which of the following commands lists a router's routing table information?

show ip route

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action?

shutdown

Which of the following utilities is also known as a packet sniffer?

tcpdump

The part which identifies the network in an IPv4 address is known as _____.

the network ID


संबंधित स्टडी सेट्स

Geology Lesson 9b: Absolute and Geologic Time

View Set

Chapter 15: Cancer Lewis: Medical-Surgical Nursing, 10th Edition, Ch 13: Altered Immune Responses and Transplantation, MED SURG CH 14 Infection and Human Immunodeficiency Virus Infection, Lewis Ch. 17 - Preoperative Care, Chapter 16: Fluid, Electroly...

View Set

Nursing Exam 4-Chapter 24 Questions

View Set