Networking + 2
Which Microsoft technology can be used to create virtual devices on a physical device on-premise? VMWare Azure App-V Hyper-V
Hyper-V
The Jaypeg Group of Institutions has come up with a new department for sociology. It has hired you to complete the network setup for this department. On inspection, you get to know that you just need to extend the connection provided by an existing ISP. Where will you, as a network engineer, extend the connection to in such a case? MDF Data room Work area IDF
IDF (Every campus has only one MDF (main distribution frame), so it won't be possible to have multiple MDFs in a building.)
JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario? VoIP Patch panel IDF Racks
Racks
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply. a. Command Prompt b. Microsoft Edge c. Zenmap d. PowerShell
a. Command Prompt c. Zenmap d. PowerShell
Which network diagram shows a logical topology? a. Floor plan b. Network map c. Wiring diagram d. Rack diagram
b. Network map
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? a. Fiber-optic cable b. Patch cable c. Plenum-rated cable d. Backbone cable
b. Patch cable
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack? a. Padded feet b. Rack ears c. AC adapter d. Large fans
b. Rack ears
In which phase of a system life cycle is a device procured into the organization and becomes an asset, identified using a specific number or similar identification method? Maintenance Acquisition Implementation Decommissioning
Acquisition
Which phase is defined after the Preparation phase in the Incident Response Plan? Containment Recovery Eradication Identification
Identification (There are six phases in incident response plan: Preparation Identification Containment Eradication Recovery Lessons Learned)
Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements? MSA SOW SLA MOU
MSA
In which type of Non-disclosure Agreement (NDA) do you have more than two parties involved, but just one party shares the information with the other parties? Multilateral Bilateral Unilateral Both unilateral and multilateral
Multilateral
When writing the site survey report, which of the following points should be included? [Choose all that apply] Number of wireless access points required Number of users who will be able to connect to the access point Recommendations on type of wireless access points Amount of redundancy Mounting locations along with the cable path
Number of wireless access points required Recommendations on type of wireless access points Amount of redundancy Mounting locations along with the cable path
Which of the following are the components of a standard operating procedure document? [Choose all that apply] Purpose Procedures Responsibilities Definitions Scope
Purpose Procedures Responsibilities Definitions Scope
Which SCADA component is geographically dispersed and receives commands to perform certain tasks? Master Terminal Unit (MTU) Remote Terminal Unit (RTU) Human Machine Interface (HMI) Programmable Logic Controller (PLC)
Remote Terminal Unit (RTU)
You have been hired by an ISP to extend the WAN connection to a housing society in Manhattan. Your primary job is to ensure that the fiber cable connection is appropriately connected to the LAN in the society after which a network engineer will be sent by the ISP for further proceedings. At what point does your job end in this situation? At the data room At the demarcation point At the work area At the main distribution frame
At the demarcation point
You have been hired by Zebra Infotainment as a network administrator. Your first task on the job is to document the list of all the vendors. Under which category would you put the list of vendors while creating a network document? Procedures Network configuration Special instructions Contacts
Contacts (Procedures in network documentation will include task details, workflows, role assignments, essential equipment or supplies, compliance requirements, and safety restrictions.)
Which of the following is also known as telecommunications room? Data room Patch panel MDF Rack
Data room
Which of the following will act as the point where the WAN ends and the LAN begins? Demarc Data room MDF Work area
Demarc
When is the disaster recovery plan invoked? During the disaster Any time Post the disaster Before the disaster
During the disaster
Which of the following cables transmits data via pulsing light? UTP STP PVC cable Fiber optic cable
Fiber optic cable
On which of the following device can you not assign an IP address? Layer 3 Switch Hub Load Balancer Router
Hub
A client has contracted you to fix an error arising from an employee's workstation. You try to fix the error by doing a system upgrade. Post the upgrade, you notice that the system is not booting up. Which of the following processes will help you to revert the system to the previous version? Rollback Patch Upgrade Network mapper
Rollback
Which of the following networking device can be used to implement access lists, dynamic routing protocols, and Network Address Translation (NAT)? Layer 3 Switch Router Hub Layer 2 Switch
Router
Which of the following virtual device can be created using Hyper-V? Virtual Firewall Virtual Switch Virtual Router Virtual Network Load balancer
Virtual Switch
Which of the following devices can be created using Network Function Virtualization (NFV)? [Choose all that apply] Virtual firewalls Virtual Load balancers Anti-virus application Web Server
Virtual firewalls Virtual Load balancers
If you enable password history in a Windows environment, how many passwords are remembered by default? 24 36 10 12 8
24
In a physical network diagram, which of the following entities should be documented? [Choose all that apply] Servers Clients Firewalls VoIP Phones WAN Links
ALL
What is the purpose of creating a Private virtual switch using Hyper-V? Isolate a virtual device Connect virtual devices to the physical host Connects locally located virtual devices together Connect physical as well as virtual devices together
Connects locally located virtual devices together
All of them are types of printers except ______. Liquid Inkjet Dot-matrix LED 3D Laser
Liquid
Which of the following is the main panel that houses the main incoming cables for the building or floor? MDF SDF JDF IDF
MDF
At what point does the ISP hand over responsibility to the customer? a. IDF b. MDF c. Demarc d. Patch panel
c. Demarc
Which change management principle must you apply to all changes regardless of scope or impact? a. Acquire review board approval. b. Submit a change request document. c. Document the change. d. Apply the change as soon as possible.
c. Document the change.
How can a virtual device communicate with a physical device on the network? Using an external virtual switch Using a private virtual switch Using a virtual network load balancer Using an internal virtual switch
Using an external virtual switch
Globe Communications is a well-known ISP that has hired Michelle as a network administrator. Recently, the administration department at Move Makers Ltd. sent an enquiry to Globe Communications if it could set up a connection using either a fiber cable or a wireless link that connects the main distribution frame (MDF) and the entrance facility at Move Makers' newly established Manhattan branch. Michelle has been appointed for this project. Analyze which of the following cabling methods would be an ideal option for this assignment. Horizontal cabling will be ideal as the distance isn't much. Backbone cabling should be used as it will provide a vertical cross connect. Plenum cabling should be preferred as it is fireproof. Patch cabling will help minimize the cost and will be effective.
Backbone cabling should be used as it will provide a vertical cross connect.
Which of the following are the benefits of a Wireless LAN Controller? [Choose all that apply] Centralized update deployment Interference detection Wireless access point status detection Simplified wireless network maintenance Centralized logging Flexible deployment of a wireless access point
Interference detection Wireless access point status detection Simplified wireless network maintenance Flexible deployment of a wireless access point
Which of these is considered a secure place to store a list of documented network passwords? a. A password manager b. A sticky note under the keyboard c. The MDF d. The CEO's smartphone
a. A password manager
When defining a baseline of a server, which of the following components' utilization must be included? [Choose all that apply] Network Display Adapter Memory Hard Drive USB Processor
processor memory hard drive network
Which change is designed to close a security vulnerability without affecting other components of an application? a. Patch b. Rollback c. Upgrade d. Installation
a. Patch
According to structured cabling standards, there must be at least one _______ on each floor. a. IDF b. Demarc c. MDF d. Work area
a. IDF
What is the first step of inventory management? a. List all components on the network. b. List an administrative account's username and password for each device on a network. c. Identify network requirements. d. Interview users.
a. List all components on the network. (The first step in inventory management is to list all components on the network. A later step would include listing usernames and passwords. Identifying network requirements is the initial phase of the system life cycle. Interviewing users is the first step in the troubleshooting process.)
What type of diagram shows a graphical representation of a network's wired infrastructure? a. Wiring diagram b. Network topology c. Network map d. Rack diagram
a. Wiring diagram
Which of the following causes physical layer failures? a. SCADA b. EMI c. STP d. PVC
b. EMI
Which of the following devices are you likely to find in the MDF? Choose all that apply. a. Network printer b. KVM switch c. Switches d. Routers
b. KVM switch c. Switches d. Routers
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet? a. Dedicated telephone switch b. Voice gateway c. Legacy PBX d. VoIP phone
b. Voice gateway (A voice gateway device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet, or it converts VoIP data from an internal IP network to travel over a phone company's analog telephone lines. A legacy PBX is a dedicated telephone switch that connects and manages calls within a private organization, and it manages call connections that exit the network through a VoIP gateway. A VoIP phone might be a telephone sitting at each user's location or an application hosted on a user's computer or other device.)
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them? a. Work area b. CEO's office c. EF d. IDF
c. EF (Entrance Facility)
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill? a. Look at the manufacturer information on the device's label. b. Look at purchase records for the device to determine when it was acquired. c. Look at whether the device is located on the ISP's side of the demarc. d. Look at what kinds of cables are connected to this device.
c. Look at whether the device is located on the ISP's side of the demarc.
In which life cycle phase is an old device removed from the network? a. Requirement analysis b. Evaluation c. Documentation and maintenance d. Implementation
d. Implementation
When an Internet connection goes down, what business document defines a customer's options for paying a reduced rate? a. RFP b. MOU c. SOW d. SLA
d. SLA