Net+ exam cram 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A network administrator is setting up a 192.168.1.0/24 network using variable length subnet masking (VLSM) to support the sales and marketing department. The sales department has 120 computers and the marketing department has 50 computers. Which of the following Internet Protocol (IP) address configurations will provide adequate support for the marketing department? (Select all that apply)

255.255.255.192 192.168.1.128/26

An attacker used a malicious host with a spoofed physical address to perform cache poisoning and perpetuate a Man-in-the-Middle attack. Which of the following can prevent these types of attacks? (Select all that apply)

ARP inspection

A system that contains custom applications routinely crashes. IT decides to upgrade the operating system after speaking with application support personnel. In which of the following ways should IT troubleshoot the matter?

Establish a plan of action

An IT engineer working on a Fibre Channel storage area network (SAN) implementation suggests lossless Ethernet technology to avoid the cost of specialized adapters and cabling. Analyze the available options and known capabilities. Of these choices, which is the best option for the engineer to suggest implementing as a solution?

FCoE

Did you Study Sub netting?

I dood noot

Windows workstations at a small company are not able to log on to a Windows server. Which of the following is the likely cause?

Incorrect system time

A network administrator implements a storage area network (SAN) in a data center. The selected technology to create the links will use Host Channel Adapters (HCA) and Target Channel Adapters (TCA). Which does the admin implement?

Infinaband

A company has an Active Directory domain called specks.com. The company has an on-demand subscription for cloud services and wants to ensure their internal applications are accessible to their remote employees via their Fully Qualified Domain Names (FQDNs) in the cloud. The company will control all these services and applications. Which of the following will the company most likely be using throughout their organization? (Select all that apply)

Internal DNS server Cloud-hosted DNS server

How can deploying a honeypot or honeynet within a demilitarized zone (DMZ) help an organization improve its security systems? (Select all that apply)

It provides detection of internal fraud.

Users on a network are complaining about entering credentials each time they want to access multiple log-in portals. What can the network administrator implement to prevent the need for users to re-authenticate to access different resources? (Select all that apply)

Kerberos SSO(Single Sign-on)

A company is considering using a co-location connection with a cloud service provider to support some virtual services in its data center. This will provide the company a hybrid cloud model to easily move services from the local infrastructure to the cloud during peak season. Which of the following network components are most likely required for hybrid solution? (Select all that apply)

MPLS Private link Vlan

IT implements a new network storage device for users at a location. Part of the roll-out includes the implementation of network file system (NFS) shares. Which solution has IT implemented?

NAS

A network administrator is measuring Key Performance Indicators (KPI) for an industrial network. Which of the following are examples of a KPI? (Select all that apply)

MTTR MTBF

Did you memorize the wiring diagrams for A, B and crossover?

No

Users mention that in a certain part of a company building, the wireless signal is weak. What TWO areas should IT support investigate to help remedy the problem?

Power level Chanel Overlap

A company wants to leverage block level storage with jumbo frame packets. The storage must be accessible remotely and isolated only to the servers. Which type of network topology is most appropriate for this setup?

SAN

A network administrator needs to upgrade a switch firmware remotely. The firmware bits must be transferred over the local area network (LAN) with no encryption. Which of the following options is connection-oriented and guarantees delivery in this manner?

SFTP FTP Telnet

A network engineer plans a storage area network (SAN) installation that will utilize Fibre Channel switched fabric (FC-SW). Which components will the engineer configure to implement the SAN's functionality? (Select all that apply)

Target Initiator

A common internet user is setting up a home wireless network but did not secure the Wireless Local Area Network (WLAN) with the proper encryption scheme. Which of the following is true about this wireless network?

The WLAN is vulnerable to war driving.


संबंधित स्टडी सेट्स

Science Year 10- Acids and Bases

View Set

Chapter 5: Perceiving Objects and Scenes

View Set

Central Venous Access Devices and Management

View Set

Conditional Probability: assignment

View Set

Contemporary Management - Exam III

View Set

Brunner and Suddarth Chapter 55 Study Guide Questions Part 2

View Set

Advanced Pharmacotherapy III Exam 3

View Set