Network + Pratice Test 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which one of the following DNS record types holds the name-to-address mapping for IPv6 addresses? AAAA records CNAME records NS records MX records

AAAA records

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers? Active Directory Clients Workgroups RAID

Active Directory

Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements? An SLA An MSA An RPF An MLA

An MSA

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query? An MOU An MSA An RFP An SOW

An RFP

Which of the following statements stands true? FTP servers provide secure encryption for file transfer. HTTP is a secured protocol that provides secure transmission. The DBMS does not support a multiuser environment. An email can be downloaded to the client computer using POP3.

An email can be downloaded to the client computer using POP3.

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements. .com .biz .mil .eu

.biz

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87? 10.43.23.3.87 10.43.3.87:23 10:23.43.3.87 10.43.3:23.87

10.43.3.87:23

What is the maximum allowable distance for horizontal cabling? 100 m 50 m 7 m 90 m

100 m

Which of the following addresses can be identified as an APIPA address? ping 8.8.8.8 169.254.0.1 127.0.0.1 255.255.255.255

169.254.0.1

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue? 21 23 53 25

25

What is the secure port for HTTPS? 587 23 80 443

443

The Mosiac Music School has hired Kirk to set up a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided? 993 5060 995 5061

5061

Identify which of the following statements is Correct. A 32-bit IPv4 address is organized into four groups of 8 bits each. The first part of an IPv address identifies the host, and the last part identifies the network. IPv4 is categorized into three classes. The approximate number of possible networks in class B IPv4 is 126.

A 32-bit IPv4 address is organized into four groups of 8 bits each.

Which of the following manages the dynamic distribution of IP addresses to devices on a network? A MAC address NAT A DHCP A gateway

A DHCP

Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario? Question 102 options: An industrial-grade router A consumer-grade router A switch A combo device

A combo device

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution? WAN BAN CAN PAN

CAN

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered? WAN MAN PAN CAN

CAN

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case? AAAA record CNAME record PTR record MX record

CNAME record

Yang, a network engineer, has been tasked with establishing a new long-distance connection for the branch offices between Manhattan and Texas by an ISP. In doing so, analyze which of the following cables he should opt for in order to obtain maximum speed and bandwidth. Fiber optic cable UTP STP Patch cable

Fiber optic cable

Which of the following is an optional server that receives queries from local clients but doesn't work to resolve the queries? Primary DNS server Secondary DNS server Forwarding DNS server Catching DNS server

Forwarding DNS server

Which of the following is an example of an industrial controls system? HVAC PVC EMI MDF

HVAC

Hari has been employed by Telnet Softtech Ltd. as a senior network engineer. Analyze which of the following statements he should keep in mind while visiting the data room of a multinational company for monitoring and security purposes. He should have the HVAC sensors connected as network devices themselves. Every data room can have unlimited IT personnel with copies of the keys. The servers and switches cannot contain temperature sensors, and so they have to be installed. No environmental alarms can be programmed.

He should have the HVAC sensors connected as network devices themselves.

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation? He should use POP3 to deliver the message. He should use IMAP4 to deliver the message. He should use the SSH protocol to deliver the message. He should use the RDP protocol to deliver the message.

He should use POP3 to deliver the message.

What is the purpose of the TXT (text) DNS resource record? Indicates the authoritative name server for a domain Holds any type of free-form text Identifies an email server and is used for email traffic Holds the name-to-address mapping for IPv6 addresses

Holds any type of free-form text

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system? dig google.com apt-get install dnsutils dig google.com ANY dig -x 74.125.21.102

apt-get install dnsutils

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices? hostname hostname A hostname -I sudo hostname

sudo hostname

Which of the following cabling methods connects workstations to the closest data rooms? Backbone cabling Horizontal cabling Plenum cabling Patch cabling

Horizontal cabling

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards? STP UTP Fiber optic cable Patch cable

Patch cable

As a senior network engineer, which of the following would you use when you are setting up a network connection at a university and you have to connect and organize lines running from walls to racks to network devices? Patch panels Cable trays STP MMF

Patch panels

Which of the following cables comes coated with a flame-resistant jacket? UTP cable PVC cable STP cable Plenum cable

Plenum cable

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario? Plenum-rated cable PVC STP UTP

Plenum-rated cable

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection? Port 1433 Port 3306 Port 3389 Port 5061

Port 3389

Riverview Union High has contacted you to establish a secure communication over the computer network by encrypting the communication protocol using the SSL. Which of the following registered ports will you use to secure the connection? Port 514 Port 123 Port 443 Port 3389

Port 443

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply? Presentation layer Transport layer Data link layer Physical layer

Presentation layer

You are a network technician who, on inspection, has found that one of the cables is faulty as a result of which you now have to insert a new piece of twisted pair into the data receptors to complete the circuit. Which of the following will you apply to sort this issue? Patch panel Punchdown tool Wall jack KVM

Punchdown tool

You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand? AD Hypervisor RAID Workgroup

RAID

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? The Telnet protocol RDP The SSH protocol POP3

RDP

Hill Corporation Ltd., an Internet service provider, has been providing networking solutions to Riverdale High School for over a year. However, recently the administration at Riverdale high School has been complaining of an unstable connection. You are employed by Hill Corporation for the purpose of inspecting the issue at hand. What would be your first check point to ensure that there are no network issues from the service provider's end? The individual distribution frame (IDF) The main distribution frame (MDF) The entrance facility The data room

The entrance facility

If a twisted-pair cable has a diameter of 0.8 cm, which of the following options would you apply as the bend radius of the cable so that data transmission is not impaired? 2.4 cm 1.6 cm 3.2 cm 3 cm

Twisted-Pair = 4x bend radius Fiber Optic = 10x bend radius 3.2 cm

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for? UDP TCP SNMP IMAP4

UDP

Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath? UTP STP MMF SMF

UTP

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation? Multicast address Anycast address Loopback address Unicast address

Unicast address

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario? Use a bottom-to-top OSI layers approach Use a top-to-bottom OSI layers approach Escalate the problem Check the change management policies of the organization

Use a top-to-bottom OSI layers approach

What should be the ideal procedure after implementing the solution to a network troubleshooting problem? Document findings, actions, and outcomes. Test the theory to determine the cause. Verify functionality and implement preventive measures. Establish a theory of probable cause.

Verify functionality and implement preventive measures.

Which of the following is a component of backbone cabling that runs between building floors? Vertical cross connect IDF MDF Work area

Vertical cross connect

You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario? VoIP POP3 IMAP4 SIP

VoIP

Which of the following client-server applications use Apache and Nginx? Email services FTP services Web service DNS service

Web service

Which of the following ports are used by applications such as Telnet, FTP, and HTTP? Private ports Well-known ports Registered ports Dynamic port

Well-known ports

The process of designing, implementing, and maintaining an entire network is called _____. patch management SCADA a network loop a system life cycle

a system life cycle

You are a junior technician at KVM Solutions. They have just received a query from a university who wants their network connection to be set up. You have been tasked with sketching a diagram for the various network devices that will be used to establish the connection. Which of the following options would you apply to identify the routers in that connection? A rectangular box, but with squiggly lines on the front A brick wall symbol A hockey-puck shape with two arrows pointing inward and two arrows pointing outward A small rectangular box, which contains four arrows pointing in opposite directions

A hockey-puck shape with two arrows pointing inward and two arrows pointing outward

What is a graphical representation of network devices and connections known as? A Zenmap A network diagram A rack diagram A wiring diagram

A network diagram

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you? Peer-to-peer networks are scalable and so they are beneficial. Peer-to-peer networks generally have secured access points preventing unauthorized access. A network operating system is much more expensive than a desktop operating system. A peer-to-peer network model allows network problems to be diagnosed and monitored from a single place.

A network operating system is much more expensive than a desktop operating system.

The administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address? A private port number A dynamic port number A registered port number A well-known port number

A private port number

Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack? A wiring diagram A rack diagram A network diagram A network mapper

A rack diagram

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose. A star topology A mesh topology A ring topology A bus topology

A star topology

Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario? A star topology A mesh topology A ring topology A bus topology

A star topology

A client who has a small office setup has complained about a faulty wired connection in their LAN as a result of which they are unable to use the broadband service to access the Internet. You, as a network technician, have to solve the matter. Which of the following will you need to access the situation? A Zenmap A wiring diagram A rack diagram A network diagram

A wiring diagram

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand? Horizontal cabling Backbone cabling Plenum cabling Patch cabling

Backbone cabling

PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional. Which of the following statements should Suleiman consider while considering a change in a network? Change management procedures should consist of preparing a backup plan as well. Change management procedures do not evaluate the cost of change of a plan. Changes to a network can be done without keeping in view the effect of the change on its users and applications. Changes to a network should be done when there are maximum users on the network.

Change management procedures should consist of preparing a backup plan as well.

The University of Philadelphia wants you to format an IPv4 address through which the dean of the university wants to go on a videoconference with the teaching staff about certain educational norms which they plan on implementing. Which of the following classes of classful addressing will you apply to deliver the requirement? Class A Class D Class E Class C

Class D (Multi-cast)

What should you do once you have tested your theory to determine the cause of the problem at hand? Establish a plan for resolving the problem. b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes. Analysis: Correct. Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data. Incorrect. Before implementing a solution, one should establish a plan of how the implementation will affect the users. Incorrect. These preventive measures are to be followed post implementation. Incorrect. Call tracking systems to document problems and resolutions are the final stages in such a scenario.

Correct. Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data.

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers? CuteFTP MySQL Oracle Database Nginx

CuteFTP

Which of the following is an enclosed space that holds network equipment? MDF Data room Demarc Work area

Data room

What is the logical group of Windows Servers controlling the network access to a group of computers also known by? Client RAID Router Domain

Domain

Silicone Printers has raised a ticket claiming that it was unable to view websites from its workstations, because with every attempted access, the system displayed an error message that read "there is another device using the same IP address." What would you, as a network engineer, check for in such a scenario? Incorrect gateway Duplicate IP addresses Incorrect subnet mask DHCP scope exhaustion

Duplicate IP addresses

Which of the following ports range from 49152 to 65535 and are open for use without restriction? Sockets Dynamic and private ports Well-known ports Registered ports

Dynamic and private ports

The Cambridge Law Department has complained of a loss of network signal from time to time. On inspection, it has been noticed that the loss of signal is due to noise interference at the physical layer. Analyze which of the following measures should be taken to sort out this issue. Ensure that you do not leave more than an inch of exposed cable before a twisted-pair termination. Install the cables through cable conduits and seal the ends of these pipes. Use patch panels to organize and connect lines. Ensure that the cables are at least 3 feet away from fluorescent lights or other sources of EMI.

Ensure that the cables are at least 3 feet away from fluorescent lights or other sources of EMI.

The University of Mordor houses almost 1000 students in its campus. It has multiple buildings in the campus where free food and Internet services are provided for the students. The University boasts of providing one of the fastest Internet experiences in the country and there have never been any reports of the service going down. To ensure such efficient connectivity, the University adheres to the ANSI/TIA standards to better manage the data feed from the main data facilities. Which of the following can be reasonably inferred from the above scenario? There are multiple MDFs in every building. The network setup used to connect the central network to other nodes is organized in a star topology. Every floor in the building has an individual IDF. The cable sheath used to provide the connection is plenum-rated.

Every floor in the building has an individual IDF.

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network? ICMP RDP Syslog NTP

ICMP

Royal Global University has just set up a new department for biotechnology and has hired you to extend the network connection to this department. Which of the following equipment do you think is necessary while extending the connection? MDF Demarc point IDF Data room

IDF

Which of the following institutions assigns a manufacturer's OUI? ICANN IEEE IANA FQDN

IEEE

Katy, a senior technician, wants to document all the devices that are connected to the network of Ford Industries, which has a large complex network. She wants to ensure that all information in the network, including the hostnames, manufacturer names, operating systems, and IP addresses, are well-documented. Which of the following tools should she opt for to carry this out? Nmap IP scanner dig ipconfig

IP scanner

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario? Identify why the application is behaving in this manner and the symptoms behind such behavior. Try to establish a theory by yourself regarding the cause by following the OSI model. Escalate the problem. Document the data regarding the person who initially alerted you regarding the anomaly.

Identify why the application is behaving in this manner and the symptoms behind such behavior.

Which of the following statements is true? Physical topologies mostly refer to how software controls access to network resources. In a peer-to-peer network model, each computer controls its own administration, resources, and security. In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network.

In a peer-to-peer network model, each computer controls its own administration, resources, and security.

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing? Incorrect DNS Incorrect IP address Incorrect subnet mask Duplicate IP address

Incorrect DNS

As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water? Make sure that the cable sheath is plenum-rated. Install cable through conduits. Install the cable at least 3 feet away from sources of EMI. Do not leave more than an inch of exposed cable.

Install cable through conduits.

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be. It will increase the possibility of noise interference, which will affect the network's signals. It will risk connectivity and data transmission problems. It will increase the possibility of transmission interference between wires. It will make it difficult to diagnose data errors.

It will increase the possibility of transmission interference between wires.

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as? Tracking system Knowledge base Change management SDS

Knowledge base

What other technical name or PDU can be used to represent the session presentation and application layer? L4PDU L7PDU L3PDU L2PDU

L7PDU

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination. IP address MAC address Application layer domain Transport layer ports

MAC address

Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN? Demarc Point MDF Data Room VoIP telephone equipment

MDF

A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation? Mac Ubuntu Server Red Hat Enterprise Windows Server 2019

Mac

Which of the following DBMS applications would you use if you were to organize data into tables and records? Apache MS Outlook FileZilla Microsoft SQL Server

Microsoft SQL Server

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case. Unicast address Loopback address Link local address Multicast address

Multicast address

Which of the following protocols is used to synchronize clocks on computers throughout a network? TFTP LDAP IMAP4 NTP

NTP

Larry is a senior technician who has to document the recent troubleshoot he carried out at Kroger Industries related to the baseline configuration of network devices. Larry is still unsure as to what category type he should document the troubleshoot so that it falls under standard operating procedures. Analyze which of the following category types Larry should opt for in such a scenario. Procedures Hardware Software Network configuration

Network configuration

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error. Presentation layer Network layer Transport layer Data link layer

Network layer

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved. Open up port 1433 Open up port 1521 Open up port 389 Open up port 5061

Open up port 1433

In reversing a software upgrade, which of the following types of upgrade uses the patch's automatic uninstall utility for reversing? Client software upgrade Shared application upgrade Operating system upgrade Operating system patch

Operating system patch

Britain Airways has complained of a faulty NIC as a result of which they are having connectivity issues within the organization. You, as a senior technician, want to find out the manufacturer of the NIC so that you can submit a report of constant bugs in their device. Which of the following addresses will help you to identify the manufacturer of the NIC? Organizationally Unique Identifier Extension identifier IP address Transport layer ports

Organizationally Unique Identifier

You are an employee for Asianet Solutions, which is an ISP. Rickwell Infrastructures has hired Asianet Solutions to establish a network connection in its organization. You have been sent to its office to stack up the routers, servers, and switches. Which of the following options would you use in such a scenario? VoIP Demarc Rack Patch panel

Rack

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers? Namespace Name servers TLD Resolvers

Resolvers

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade. Establish a plan for resolving the problem. Roll out changes in stages. Document findings, actions, and outcomes. Verify functionality and implement preventive measures.

Roll out changes in stages.

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as? Network mapper Rollback Patch Upgrade

Rollback

You have been hired to implement a major change in the financial software used by the accountants at a fast-food chain. On implementation, you notice that the devices are not compatible with the upgrade and have started showing errors, as a result of which the organization is unable to function. What would you do in such a situation? Network configuration Patch Rollback Upgrade

Rollback

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue. Firewall Computer Router Subnet Mask

Router

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO? Smartphone Network printer Router File server

Router

Which of the following consists of high capacity data storage devices in a distinctly defined network segment? MAN PAN SAN WLAN

SAN

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them? OSHA PPE Fire suppression system SDS

SDS

Which of the following protocols is used to send an email message to the first server? SMTP POP3 IMAP4 FTP

SMTP

Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases? TFTP SMB SQLnet LDAP

SQLnet

Sphinx Infra Ltd. has doubts on how to meet the various privacy, security, and safety precautions installed for their network. You have been hired to analyze the existing modules for which you will need to go through the network documentation before suggesting any change. Which segment in the network document will contain the necessary information you require? Contacts Procedures Network configuration Special instructions

Special instructions

Which of the following server racks would you use for a bolt-free mounting? Nonthreaded racks Threaded racks RouRound-hole racks Square-hole racksnd-hole racks Square-hole racks

Square-hole racks

What are larger data rooms also known as? Telecommunications enclosure Telecommunications room Patch bay Equipment room

Telecommunications room

Which of the following is the third step in a network troubleshooting methodology? Establish a plan for solving the problem. Identify the problem and its symptoms. Establish a theory of probable cause. Test your theory to determine the cause.

Test your theory to determine the cause.

As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network? The requirement phase The development phase The implementation phase The documentation and maintenance phase

The implementation phase

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router? The physical layer The session layer The transport layer The network layer

The network layer

You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books? The contact name of the person reporting the issue The symptoms of the problem The name of the technician who handled the problem The total number of computers functioning in the organization

The total number of computers functioning in the organization

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? User accounts and passwords to the networks are all assigned in one place. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. Problems on the network can be monitored, diagnosed, and fixed from one location. Access to multiple shared resources can be centrally granted to a single user or a group of users.

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

What is help desk software used for? To document problems and their resolutions To accumulate insights and solutions to problems encountered on a particular network To properly handle substances such as chemical solvents To protect the computer from an ESD charge

To document problems and their resolutions

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario? Internet Message Access Protocol Simple Network Management Protocol Transmission Control Protocol User Datagram Protocol

Transmission Control Protocol

A client contacted you to avail your services of cable installation. The requirement is to set up a connection which connects workstations to the data room, and the distance between them spans 87 meters. Which of the following cabling methods would be an ideal option for this assignment? Patch cabling Horizontal cabling Backbone cabling Plenum cabling

horizontal cabeling

Which of the following hostname commands resolves a device's hostname with its IP address on the network? hostname hostname -A hostname -I sudo hostname

hostname -I

JHS Mediaworks has contacted you to troubleshoot some TCP/IP errors on some workstations within the organization. On inspection, you get to know that the workstations functioning on Windows are all stable and the ones running on UNIX and Linux systems are the ones that need troubleshooting. Which of the following command-line tools will you use in such a scenario to view and manage the TCP/IP settings? ip hostname nslookup IP scanner

ip

Which command displays the full list of available objects and commands? ip link show ip address show ip link help ip help

ip help

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer? ip dig ipconfig ping

ipconfig

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running? ping 192.168.1.1 ping 127.0.0.1 ping -a 8.8.8.8 ping -?

ping 127.0.0.1

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful. ping -a 8.8.8.8 ping 92.10.11.200 ping 192.168.1.1 ping 8.8.8.8

ping 8.8.8.8


संबंधित स्टडी सेट्स

System of Equations, Systems of Equations in 3 Variables

View Set

Ch 1-5 Question and Answer Study Guide - Night - Ms. Brown

View Set

different types of vegetarian diets

View Set

Ch. 13 Marketing: Helping Buyers Buy

View Set