Networking + 12
Which of the following can be determined using a WiFi Analyzer? [Choose all that apply] The domain name of the network Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point Wireless Access Point password
Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point
Which of these hardware metrics needs to be measured to ensure the availability of the network? [Choose all that apply] CPU utilization Temperature Hard drive space Memory
CPU utilization Temperature Memory
Which of the following backups is managed by third-party vendors? Incremental backup Full backup Cloud backup Differential backup
Cloud backup
Which of the following will affect the quality of VoIP calls? Latency Jitter Bandwidth CPU utilization
Jitter
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? a. Time to Live b. Traffic Class c. DiffServ d. Priority Code Point
c. DiffServ
Which of the following would an environmental monitoring system not track? a. User authentication b. Data room lights c. UPS voltage d. Liquid detection
a. User authentication
Which log type is used to prove who did what and when? a. Traffic log b. Audit log c. System log d. Syslog
b. Audit log
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? a. Dual power supplies b. Online UPS c. Standby UPS d. Generator
b. Online UPS
When repairing a coworker's computer, you find some illegal files. What should you do next? a. Delete the files. b. Take screenshots on the computer and save them in your own folder. c. Disconnect the computer from the network and leave it running. d. Shut down the computer and unplug it.
c. Disconnect the computer from the network and leave it running.
What port do SNMP agents listen on? a. Port 21 b. Port 20 c. Port 161 d. Port 162
c. Port 161
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? a. Congestion control b. Power management c. Traffic shaping d. Flow control
c. Traffic shaping Traffic shaping can be used to limit the volume of traffic flowing into or out of an interface
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? a. Choke packet b. Stop-and-wait c. Go-back-n sliding window d. Selective repeat sliding window
d. Selective repeat sliding window
Which backup site includes a running server that does not have access to the latest backups? a. Cold site b. Hot site c. On site d. Warm site
d. Warm site
Which of the following monitors traffic at a specific interface between a server or client and the network? Protocol analyzer Network monitor Port mirroring Reporting
Protocol analyzer (A network monitor is a tool that continually monitors network traffic and might receive data from monitored devices that are configured to report their statistics. A similar tool, a protocol analyzer, can monitor traffic at a specific interface between a server or client and the network.)
After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose? Mean Time Between Failure (MTBF) Mean Time To Repair (MTTR) Recovery Point Objective (RPO) Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
You are hired as a network administrator to monitor the organization's network status on an ongoing basis to make changes to meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that there is a lot of delay in network communications because some of the devices used in the network are resending transmissions. Which of the following KPIs will help you in getting a better understanding of the situation? Packet drops Utilization Jitter Error rate
Packet drops
Which port is used to establish an SSH connection to a Linux device and manage it remotely? 8080 443 21 53 22
22
Which of the following occurs when there is fluctuation in voltage levels caused by other devices on the network or EMI? Noise Blackout Surge Brownout
Noise
A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created? PL_Cluster PLCluster PLCluster1 PLABVS
PLCluster
Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? PRTG dashboard by Paessler Room Alert Monitor by AVTECH Wireshark Spiceworks
PRTG dashboard by Paessler
JV Steels has established its manufacturing plant in Alabama. Reports of a huge thunderstorm have surfaced in the media. As a network analyst at JV Steels, what kind of a power flaw should you be prepared for? Blackout Brownout Surge Noise
Surge
What is the major difference between the File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP)? TFTP can only be used on routers TFTP needs fewer resources than FTP FTP can only be used on Windows devices TFTP can only be used on Linux devices
TFTP needs fewer resources than FTP
A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster. Warm Cold Hot Cloud Passive
Warm
Which of the following would be assigned an OID? a. A web server b. An NMS server c. A UDP port d. A switch's interface
d. A switch's interface A device, such as a web server, can be managed by an NMS server, typically using UDP ports 161 and 162. Each managed device may contain several managed objects, which can be any characteristic of the device that is monitored, including components such as a switch's interface, processor temperature, or memory utilization. Each managed object is assigned an OID (object identifier).
Which flow control method resends a lost frame along with all frames sent with it? a. Backpressure b. Selective repeat sliding window c. Stop-and-wait d. Go-back-n sliding window
d. Go-back-n sliding window
Which of the following needs to be done to ensure a backup can be scheduled? [Choose all that apply] Identify and configure storage solution for the backup Use a user account to create the backup Create a virtual switch in Hyper-V Install the Windows Server Backup feature Configure a network interface card
Identify and configure storage solution for the backup install the Windows Server Backup feature
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? a. NetFlow b. Wireshark c. Spiceworks d. iPerf
b. Wireshark
Which application on Windows devices can be used to review events that occurred on the local system? Disk Management Task Manager Event Viewer File Explorer
Event Viewer
Which service needs to be configured to ensure metrics for network devices can be captured? SMTP DNS SNMP DHCP
SNMP
Which power device prevents a critical server from losing power, even for an instant? a. Surge protector b. Generator c. UPS d. PDU
c. UPS
When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster? [Choose all that apply] The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured The server has the Windows Server Backup feature installed The server uses a local user account to log in
The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured
Which of the following is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage? Generator PDU UPS Surge protector
UPS
Which of the following KPIs (key performance indicators) refers to the actual throughput used as a percentage of available bandwidth? Packet drops Utilization Jitter Error rate
Utilization
Which of the following Log Level Severity levels indicates that there can be a potential problem? Critical error Warning Error Information
Warning
Jeff Green has been hired as a systems analyst by an online retail company. The company is expecting a huge network traffic triggered by the Christmas sale, which will begin from the midnight of December 23. There is an urgent need to adopt a congestion control technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop congestion control technique to prevent this congestion before it occurs. Which of the following techniques should Jeff ideally choose to ensure that important traffic can survive the congestion while less sensitive frames are discarded? Acknowledgment policy Window policy Admission policy Discarding policy
Discarding policy
Why would a terminal emulator be used? To establish a remote connection to a Linux device from a Windows device To run powershell commands on a Linux device To create an FTP connection To establish a remote connection to a Linux device from a Linux device
To establish a remote connection to a Linux device from a Windows device
Which log type would most likely be used first to investigate the cause of high numbers of dropped packets? a. Traffic log b. Audit log c. System log d. Jitter log
a. Traffic log Historical traffic logs can be used to investigate security breaches, confirm regulatory compliance, and investigate network performance issues. A system log tracks information on a single device and will not be helpful until you know which device(s) to check. The data in an audit log is thorough enough to retroactively prove compliance and is often used in forensics investigations; due to the level of detail included, an audit log is not likely the best place to start investigating a network problem. There's no such thing as a jitter log.
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? a. Cold site b. Standby site c. Warm site d. Hot site
a. Cold site
Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue. By checking the interface statistics of the network By calculating the error rate By checking if the connection has any jitter By checking if the network is operating at maximum capacity
By checking if the connection has any jitter
Which of the following statements is true? Choose two. a. When streaming a movie, the transmission is sensitive to loss and tolerant of delays. b. When sending an email, the transmission is sensitive to loss and tolerant of delays. c. When sending an email, the transmission is sensitive to delays and tolerant of loss. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.
b. When sending an email, the transmission is sensitive to loss and tolerant of delays. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? a. Jabbers b. Top listeners c. Giants d. Top talkers
b. Top listeners
Which of the following is not defined by syslog? a. Message security b. Message handling c. Message transmission d. Message format
a. Message security The syslog standard addresses three primary components, including event message format, event message transmission, and event message handling. Syslog does not define or require message security
What command requests the next record in an SNMP log? a. SNMP Get Next b. SNMP Get Request c. SNMP Get Response d. SNMP Trap
a. SNMP Get Next
Which bandwidth management technique limits traffic specifically between a single sender and a single receiver? a. Traffic shaping b. Flow control c. Quality of Service d. Congestion control
b. Flow control flow control manages the number of frames transmitted end-to-end between a single sender and a single receiver. Congestion control, however, manages the volume of traffic throughout the network.
Why is it essential for a Network Administrator to monitor network bandwidth utilization? [Choose all that apply] To detect malicious applications To detect the available hosts on the network To ensure applications function correctly To prevent users from accessing the internet To ensure users can connect to network resources
To ensure applications function correctly To ensure users can connect to network resources