Network + Practice Test 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask? 30 14 62 126

14

Beevan works as a network analyzer for an ISP. The network manager has asked him to use a protocol for the routers that can scan beyond the home territory and can instruct a group of routers to prefer one route over other available routes. Analyze which of the following should be used in this scenario. EIGRP IS-IS BGP OSPF

BGP

In which of the following modes will a vNIC access a physical network using the host machine's NIC? Isolation mode Host-only mode NAT mode Bridged mode

Bridged

SMCS School has hired you to set up an Internet connection within the school premises. The Internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. Which of the following types of network will you install in this scenario? MAN WAN CAN LAN

CAN

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario? Community VLAN Voice VLAN Isolated VLAN Management VLAN

Community VLAN

Which of the following cloud models makes resources available to users through a WAN connection? Hybrid cloud Public cloud Private cloud Community cloud

Community cloud

Which of the following IGPs supports large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops? OSPF IS-IS EIGRP BGP

EIGRP

Identify which router connects an autonomous system with an outside network, also called an untrusted network. Core router Edge router Exterior router Routing table

Edge router

Jasper Infotech have an issue with their network system-a malfunctioning NIC on a router caused network outages. They have hired you specifically to ensure that the network system does not collapse when there is an unexpected hardware or software malfunction. Which of the following terms will you refer to while fixing this issue for Jasper Infotech? SAN SDN Redundancy Fault tolerance

Fault tolerance

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario? Three bits Two bits Four bits Five bits

Four bits

You are working as an executive for a cable company. A client raises a request to set up a network that uses fiber-optic cabling to connect your company's distribution center to distribution hubs and then to optical nodes near its customers. From the following network options, which one would you recommend in the given scenario? Cable broadband DOCSIS HFC Cable modem

HFC

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation? Incorrect VLAN assignment Incorrect port mode VLAN isolation Double tagging

Incorrect VLAN assignment

You, as a network engineer, have recently established a network connection for three separate department buildings in a university. One of the departments has complained that the signal strength it receives is not the same as the signal strength the other two buildings receive. Which of the following will you use in this scenario? CSU/DSU NIU DTE Line drivers

Line drivers

Which of the following can be used to provide administrative access to a switch? Data VLAN Voice VLAN Native VLAN Management VLAN

Management VLAN

Which of the following is a multipath link-state protocol? TRILL SPB CARP RSTP

RSTP

You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available so that the path to the destination can be shortened. Which of the following will help you in doing so? Convergence time AD Overhead Routing cost

Routing cost

Which of the following is a more intelligent version of an NIU (network interface unit)? Modem DCE Smartjack DTE

Smartjack

Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations? The management plane The application plane The control plane The infrastructure plane

The control plane

You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network? The access layer The distribution layer The core layer The aggregation layer

The core layer

Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario. Use the EXEC mode to apply the changes Use the global configuration mode to apply the changes Use the interface configuration mode to apply the changes Use the privileged EXEC mode to apply the changes

Use the privileged EXEC mode to apply the changes

As a network administrator, a client has approached you to set up the network for MKV, a software company. The company requires sufficient amounts of data for both uploading and downloading purposes; however, it prefers a connection that has better download speed. Which of the following DSL varieties do you think is best suited for such a requirement? ADSL VDSL SDSL DWDM

VDSL

You, as a network administrator, plan on running a trial for a beta version of an application. The idea is to install the application on a guest machine. You plan on doing this because you would rather have the untested software cause errors on the guest machine than on the host. Which of the following will you use in this instance? A BPDU guard CARP FCoE VirtualBox

VirtualBox

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use? 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248

X 255.255.255.224

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____. IP helper address relay agent classless addressing VLSM

classless addressing

Which of the following commands can be used to change a device's name? ip addr address subnet no shutdown ip name-server hostname

hostname

Which of the following commands lists a router's routing table information? s default-gateway ip default-network show ip route ip interface brief

show ip route

The part which identifies the network in an IPv4 address is known as _____. the host ID the site prefix the network ID the VTP

the network ID

What is the downtime per day for a system showing 99.9% availability? 0.4 seconds 1 minute and 26 seconds 14 minutes and 23 seconds 8 seconds

1 minute and 26 seconds

Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting? 191.254.0.32 191.254.0.96 191.254.1.29 191.54.1.64

191.254.1.29

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224. 30 24 32 16

30

Which of the following is a distinct network of storage devices that communicate directly with each other and with other portions of the network? A BPDU guard STP SDN A SAN

A SAN

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. Hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most? A private cloud A public cloud A community cloud A hybrid cloud

A hybrid cloud

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation? A root port An SDN controller A layer 3 switch Storm control

A layer 3 switch

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load? A load balancer CARP Redundancy An SDN controller

A load balancer

Which of the following switches can be configured via a command-line interface or a web-based management GUI (graphical user interface)? An unmanaged switch A managed switch Spine switches Leaf switches

A managed switch

Scott & Wayne Law Associates is a private law firm in Atlanta specializing in cases involving violation of environmental laws. The firm currently has approximately 50 employees who all work on various matters and in different departments. You have been hired as a network administrator and tasked with finding a suitable cloud model for the firm. The firm is looking for a comparatively low-cost cloud model that can be accessed only by the employees and senior management but not its clients or third parties. Which of the following cloud models would you choose? A hybrid cloud A public cloud A private cloud A community cloud

A private cloud

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). While setting up the network for one of your clients, he wants you to check whether sufficient security precautions have been taken to ensure none of the customer's switches becomes the ISP's root bridge. Which of the following will you use in this scenario to ensure that the appropriate security measures have been taken? A BPDU guard A BPDU filter A root guard A root bridge

A root guard

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address? 2608 FE10 1 AA

AA

Which form of communication is well suited to users who receive more information from the network than they send to it? VDSL ADSL SDSL xDSL

ADSL

In order to achieve the utmost fault tolerance, as a network administrator, you want to ensure that critical devices are all equipped with redundant NICs, routers, and processors, which are able to immediately assume the duties of an identical component in case one of the components fails. Which of the following will help you ensure these devices contain the necessary components you require? Hot-swappable parts Automatic failover Load balancing Clustering

Automatic failover

You have been working as the network administrator for JP Steels. In order to cut down on operating costs, you plan to install a firewall's OS (operating system) in a VM on an inexpensive server, instead of purchasing an expensive hardware firewall to protect a LAN. Hence, you no longer require a firewall that runs on its own OS. Which of the following firewalls will you purchase in this scenario? A Fortinet firewall device A Cisco firewall device A firewall device by Palo Alto Networks Barracuda's Cloudgen firewall device

Barracuda's Cloudgen firewall device

Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses? TRILL SPB CARP LACP

LACP

Examine the following circumstances as a network analyst and analyze in which of the following conditions MANs (metropolitan area networks) cannot be useful. Connecting a city's police stations Connecting a hospital with its regional medical centers Connecting a home office with its branch offices and a warehouse location Connecting a clothing manufacturer to sell its products to customers worldwide

Connecting a clothing manufacturer to sell its products to customers worldwide

You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario? Broadband DIA DSL PTSN

DIA

Which of the following devices contains ports to connect both to an incoming telephone line and to a computer or network connectivity device? NIU DSL modem PSTN Local loop

DSL modem

Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer? Line driver CSU/DSU NIU DTE

DTE

Which of the following carries user-generated traffic, such as email, web browsing, or database updates? Data VLAN Voice VLAN Private VLAN Management VLAN

Data VLAN

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization? Default VLAN Voice VLAN Private VLAN Management VLAN

Default VLAN

Which of the following refers to any router outside an organization's AS(autonomous system), such as a router on the Internet backbone? Routing table Edge router Exterior router Core router

Exterior router

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet? FCoE iSCSI IB FC

FCoE

LTE (Long-Term Evolution) and LTE-A (LTE advanced) are variations of which generation of cellular network? Third generation Second generation Fourth generation Fifth generation

Fourth generation

White Hawks runs a baseball stadium, and it would like to set up a network that has a reasonable level of availability and effectiveness so that fans can receive a close and strong signal throughput when they watch a game. Analyze which of the following statements will help in understanding why a 5G service is ideal in this scenario. Higher frequency for bands would increase the throughput. The cell density for the network must be close. Wider channels would help increase the speed. Client volume will increase the throughput.

Higher frequency for bands would increase the throughput.

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs? NFV vSwitch vNIC Hypervisor

Hypervisor

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation? Incorrect VLAN assignment Incorrect port mode VLAN isolation Double tagging

Incorrect port mode

Bradley has been running a business in his garage for over a period of 10 years. He plans on expanding the business by opening up three new offices in three different cities. Since he has accumulated sufficient profits to move to a larger office space, he plans to upgrade his network connection to one with a dedicated and symmetrical bandwidth. Bradley approaches Mantle Solutions, an ISP. Which of the following options should be offered by the ISP in this scenario? Cable broadband MPLS SD-WAN Leased lines

Leased lines

Crom Breweries is an old client of HW Internet Solutions. Crom's IT department calls HW Solutions to inform that the interface is down. HW Solutions sends a network analyst to check the situation. The network analyst assumes that an employee must have shut down the interface. He applies the show interface command to get an overview of all the devices interfaces. Analyze which of the following will help the network analyst to know whether the interface was shut down. Link state MTU Bandwidth Traffic statistics

Link state

Which of the following terms refers to the technique of grouping redundant resources such as servers so they appear as a single device to the rest of the network? Use of hot-swappable parts Automatic failover Load balancing Clustering

Load balancing

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this. Shared data Low overhead, fast convergence Stability Multi-vendor routers

Low overhead, fast convergence

You have been working with an ISP (Internet service provider) as a network engineer. You have made multiple WAN (wide area network) connections over a period of time. Recently, you have received complaints from various clients about network failure, which is having an effect on their day-to-day business. This network failure is primarily caused by some bugs in a few of the network devices. In order to protect your clientele, you have decided to provide an additional information sheet that will specifically state the amount of time you will take to fix the issue. Which of the following will you use to calculate the average amount of time required to repair the faulty device? MTTR MTBF CARP LACP

MTTR

Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers? Rapid elasticity Resource pooling Measured service Broad network access

Measured service

As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices? NIC teaming Port aggregation Load balancing Clustering

NIC teaming

Which of the following VLANs receives all untagged frames from untagged ports? Data VLAN Voice VLAN Native VLAN Management VLAN

Native VLAN

Glenn, who is working as a network engineer, has been instructed to automate many tasks to work together in a complex and lengthy workflow. What is the term for this process? Automation Orchestration Multitenacy Cloud computing

Orchestration

As a developer, you need frequent access to multiple platforms during the development process. Rather than purchasing and maintaining a separate device for each platform, you have decided to avail the cloud service option. You are looking to build and test the applications within these virtual, online environments, which are tailored to the specific needs of the project. The cloud service model should have servers that provide only the resources needed to run an application and also allow customers to run their code directly in the cloud without having to manage a server environment at all. Which of the following cloud service models do you think would be appropriate considering your requirements? Question 106 options: IaaS PaaS SaaS DaaS

PaaS

Analyze which of the following is true about a default VLAN. Ports in default VLAN can be reassigned to other VLANs. To protect a network from unauthorized traffic, a default VLAN should be changed to an unused VLAN. A default VLAN can be used to carry user-generated traffic, such as email, web browsing, or database updates. A default VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency.

Ports in default VLAN can be reassigned to other VLANs.

Global ISP has received the tender for a project that requires the company to run a fiber connection to provide Internet connection to 120 families in an area simultaneously. Analyze which of the following would be feasible for Globe ISP in this scenario. Providing the connection using FTTC Providing the connection using FTTB Providing the connection using FTTN Providing the connection using MON

Providing the connection using FTTN

You are working as a technical specialist for an ISP. The network administrator has asked you to set up a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use? EIGRP OSPF BGP RIPv2

RIPv2

Which of the following protocols can detect and correct link failures in milliseconds? TRILL SPB CARP RSTP

RSTP

You have been working as a network administrator at Yong Solutions, which is an ISP (Internet service provider). The switches used in the storage network of the ISP essentially use the STP (Spanning Tree Protocol) for detecting link failures. You have been asked to upgrade the STP because repeated reports of network transmissions being bogged down have been received. Which of the following will you use in this scenario? Question 95 options: SPB RSTP TRILL iSCSI

RSTP

You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily? Rapid elasticity Resource pooling Measured service Broad network access

Rapid elasticity

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation? Stack master VLAN hopping SAID MTU

SAID

Identify the current name of a DMZ (demilitarized zone). ANDing Network ID Host ID Screened subnet

Screened subnet

What is the term used to identify the first four blocks that normally help to identify a network? Host ID Site prefix Network ID VTP

Site prefix

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use? Stack master VLAN hopping SAID MTU

Stack master

Which of the following will you use to assign a VLAN based on the switch port the device is connected to? Static VLAN assignment Dynamic VLAN assignment SAID Subinterface

Static VLAN assignment

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue? A BPDU guard Storm control A root guard A BPDU filter

Storm control

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario? Double tagging Switch spoofing Incorrect port mode VLAN isolation

Switch spoofing

As a network analyst, you have to separate the digital communication of data in a GSM network. Which of the following will you use in this scenario? SIM CDMA TDMA TDM

TDMA

You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature? The data plane The control plane The management plane The application plane

The application plane

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus? The native VLAN should be changed to a used VLAN ID. Auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled. All VLAN ranges should be accepted on each trunk. The default VLAN should not be used.

The default VLAN should not be used.

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario. Layer 3 switches Layer 4 switches ToR switches EoR switches

ToR switches

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario? Trunking Access port Inter-VLAN routing Data VLAN

Trunking

Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario? Five 9s Four 9s Two 9s Three 9s

Two 9s

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection? High bandwidth Flexible routing Minimized latency Untagged frames

Untagged frames

Valentina is employed under the network management team at Iris Global Services, which is a software management firm. Following a recent hacking attempt at its office, the network administrator wants her to cross-check whether security precautions have been enabled on the STP interfaces so that the information transmitted by the BPDUs can be protected. On inspection, she discovers that the security precautions have not been configured. Analyze what Valentina should do in order to prevent a rogue switch or computer connected to one of these ports from hijacking the network's STP paths. Use a BPDU guard to block BPDUs Use a BPDU filter to disable STPs Use a root guard on the switches Use the shutdown command to disable unused ports

Use the shutdown command to disable unused ports

Nathan has plans of opening a call center. He will require a network connection that will have a bare minimum of 3 Gbps upstream and at least 8 Gbps downstream throughput. Analyze which of the following will provide a solution to Nathan. Using a DOCSIS 2.x (2.0 and 2.0 1 IPv6) for maximum throughput Using a DOCSIS 3.1 for maximum throughput Using a DOCSIS 3.0 for maximum throughput Using a DOCSIS 4.0 for maximum throughput

Using a DOCSIS 4.0 for maximum throughput

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN? Geographic locations Departmental boundaries Device types VLANs

VLANs

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space? VLSM Site prefix VTP Classless addressing

VLSM

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud? Internet VPN (virtual private network) Remote access connection Leased line

VPN

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____. a router-on-a-stick trunking a native VLAN ICS

a router-on-a-stick

You are working as a network engineer at Krofter Securities. The organization uses Cisco's Linux OS in all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario? route route print show ip route show running-config

route

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address? 192.168.50.120 192.168.50.118 192.168.50.255 192.168.50.0

192.168.50.118

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address? 255.255.255.0 255.255.255.255 255.255.0.0 255.0.0.0

255.0.0.0

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario? 255.248.0.0 255.240.0.0 255.252.0.0 255.254.0.0

255.252.0.0

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select? 255.255.255.248 255.255.224.0 255.255.240.0 255.255.255.192

255.255.240.0

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario? 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224

255.255.255.224

Mr. X wants to use cellular technology that offers at least 5 Mbps of download speed. He consults you about this. Which of the following cellular technologies will you suggest? 4G-LTE 5G CDMA GSM

5G

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you? 62 64 32 30

62

How many bits are used in a network with a subnet of 255.0.0.0? 8 16 32 64

8

Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (Spanning Tree Protocol) features that will block BPDUs (Bridge Protocol Data Units) on any port serving network hosts. Which of the following will he use for such purposes? A BPDU guard A BPDU filter A root guard A root bridge

A BPDU filter

Analyze which of the following can be used to establish a static VLAN assignment for a device. Client device information, such as MAC address or location Authentication processes in cooperation with a RADIUS server Assigning a VLAN based on the switch port the device is connected to All WLAN traffic grouped within the same VLAN

Assigning a VLAN based on the switch port the device is connected to

For over a decade, Ramanathan has been working as a network engineer in an MNC that uses FC (Fibre Channel) networking architecture. His primary duty is to ensure that there are no issues in the network connections between servers and SAN (storage area network) devices, so that maximum throughput is achieved at all times. Recently, one of the connections of the FC device to the network malfunctioned, which Ramanathan has to fix. Analyze which of the following Ramanathan should do in this scenario. Use NICs to connect the FC devices to the network Connect the FC devices to the network through HBAs Install CNAs to connect to network servers Use the iSCSI protocol

Connect the FC devices to the network through HBAs

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario? Geographic locations Departmental boundaries Device types VLANs

Departmental boundaries

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administrator to determine the best solution to this problem. Which type of routing path will you use to solve this problem? Static route Dynamic route Default route Gateway of last resort

Dynamic route

Your network administrator has asked you to change the subnet mask of the Cisco router used in the organization. Which of the following Cisco CLI modes would you apply in this scenario? User EXEC Privileged Exec Global configuration Interface configuration

Interface configuration

In the formula 2n = Y, what does n represent? It equals the number of hosts available in each subnet. It is the number of subnets that result. It equals the number of bits remaining in the host portion. It is the number of bits that must be switched from the host address to the network ID.

It is the number of bits that must be switched from the host address to the network ID.

You are working as a network engineer for an ISP. You have successfully set up a home Internet connection for a client. The ISP requires the network engineers to provide a document with specifications and tests that the customer can run on their own to check various aspects of their connectivity. However, in the document that you provided you forgot to mention the functionality of speedtest.net in the document. So, the client calls you with a query about the use of speedtest.net. Which of the following will be your reply to the client in this scenario? It is used for bandwidth speed tests. It is used to identify Internet access. It is used to test the router's stability. It is used for broadband cable tests.

It is used for bandwidth speed tests.

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets. MIL Ltd. can create up to 65,536 subnets. MIL Ltd. can create up to 256 subnets. MIL Ltd. can create only one single subnet. Rodri should use the 2n = Y formula to calculate the subnet.

MIL Ltd. can create up to 65,536 subnets.

Which of the following statements about MPLS (multiprotocol label switching) is not true? MPLS connections are highly scalable for businesses, which means a business can add more and longer connections for less cost than similarly scaled leased lines. Customers can prioritize their own traffic across the WAN (wide area network) according to QoS (quality of service) attributes, such as giving VoIP traffic higher priority over email traffic. The ability to label traffic offers more reliability, predictability, and security (when properly implemented) than when using cheaper connections over the open Internet. MPLS does not offer any decreased latency.

MPLS does not offer any decreased latency.

As a network administrator, you want to modernize your network with modular software running on standard server platforms. You want to start by replacing traditional, custom-designed network equipment. You also wish to have flexible, cost-saving options for many types of network devices, including virtual servers, data storage, load balancers, and firewalls. Which of the following will you use in such a scenario? SDN NFV FCoE vSwitch

NFV

An ISP's headquarters is located in Philadelphia, and it has a branch office in Canada. The ISP wants to ship an edge device to the branch location where a non-technical person can plug in the device without any configuration needed on-site. Which of the following should be used in this scenario? Cable broadband Leased line MPLS SD-WAN

SD-WAN

XYZ Ltd. is a company that has 12 regional offices around the world. All the major operations of the company are carried out from the headquarters based in New York. XYZ Ltd. has approached you, a network facilitator, to install a WAN service that can manage network configurations at multiple locations throughout the world. Which of the following WAN services would you advise to XYZ Ltd. in this scenario? Cable broadband DSL SD-WAN Fiber broadband

SD-WAN

Browski is a company that deals with SD-WAN (software-defined wide area network) units. The management of Browski wants to present an audio-video presentation at one of the network exhibitions to demonstrate its new product. As a network administrator working there, you have been asked to go through a few pointers in the presentation to verify the accuracy of the content. Analyze if any of these aspects do not apply to SD-WAN. SD-WAN is transport agnostic. SD-WAN provides better intent-based management. SD-WAN has zero-touch provisioning. SD-WAN can be more expensive than leased lines.

SD-WAN can be more expensive than leased lines.

Which of the following traverses a significant distance and usually supports very high data throughput? LAN WAN CAN MAN

WAN

You are working as a network analyzer for an ISP. A client has approached you to set up a network connection for a bank with offices around the state. The network needs to connect these offices with each other in order to gather transaction and account information into a central database. Which of the following connections will you provide in this scenario? LAN CAN WAN MAN

WAN

Blue Whale is an e-commerce website that has hired you as part of the network management team. The network administrator has delegated one of his tasks to you, which requires you to allow and configure more than one MAC address in one of the ports. Which of the following commands will help you complete the task at hand? port-security mac-limit allowed-mac switchport port-security

allowed-mac

You are employed as a network engineer. While setting up a client's connection, the client requests you to display trunks configured on a switch. Which of the following commands will you use in this scenario? sh int sh ip int br sh int tr sh int sw

sh int tr

You are employed as a network engineer. While setting up a client's connection, the client requests you to display the concise network layer information of the device interface that is being installed. Which of the following commands will you use in this scenario? sh int sh ip int br sh int tr sh int sw

sh ip int br

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action? shutdown switchport port-security port-security disable

shutdown

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch? switchport trunk native vlan ip dhcp snooping set port-mode trunk set native-vlan-id

switchport trunk native vlan


संबंधित स्टडी सेट्स

Multiplication Set 17 (6x5, 6x6, 6x7, 6x8)

View Set

Chapter 6: Introduction to consumer credit

View Set

Stats Exam 5, PSY 3801 Exam 5, PSY 3801: Final Exam, Terms, PSY 3801 Exam #3, PSY3801 EXAM 6, Psychology (Statistics)- Exam 1, Psychology 3801, PSY 3801 Stats Final, PSY 3801 Test 3, Research Methods Final

View Set

NUR 101 Unit Two Communication, Nurse-Patient Relationship, Legal Aspects

View Set

306 Ricci Chapter 13: Labor and Birth Process

View Set

Custom: Pediatrics practice questions # 2 (Ana)

View Set

MGT: Exam 1: Chapter 2 Study guide

View Set

Chemistry A New Approach to the Atom 4-4: Review and Reinforcement

View Set