CMIS280_Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device? A: ESSID B: BSS C: ESS D: IBSS

IBSS

Which of the following VLANs receives all untagged frames from untagged ports? A: data VLAN B: voice VLAN C: management VLAN D: native VLAN

native VLAN

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful. A: ping 8.8.8.8 B: ping 192.168.1.1 C: ping 92.10.11.20 D: ping -a 8.8.8.8

ping 8.8.8.8

You have been working as a networking administrator at Yong Solutions, which is an ISP (Internet service provider). The switch is used in the storage net work of the ISP essentially use the STP (Spanning Tree Protocol) for detecting link failures. You have been asked to upgrade the STP, because repeated reports of network transmissions being bogged down have been received. Which of the following will you use in the scenario? A: RSTP B: SPB C: TRILL D: iSCSI

SPB

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements. A: .mil B: .eu C: .biz D: .com

.biz

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask? A: 30 B: 126 C: 14 D: 62

14

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address? A: 192.168.50.120 B: 192.168.50.255 C: 192.168.50.0 D: 192.168.50.118

192.168.50.118

The network administrator has asked you to subnet a network that has 5 subnets, each with 16 hosts. Which subnet mask would you use? A: 255.255.255.240 B: 255.255.255.224 C: 255.255.255.192 D: 255.255.255.248

255.255.255.240

Scott & Wayne Law Associates is a private law firm in Atlanta specializing in cases involving violation of environmental laws. The firm currently has approximately 50 employees who all work on various matters and in different departments. You have been hired as a network administrator and tasked with finding a suitable cloud model for the firm. The firm is looking for a comparatively low-cost cloud model that can be accessed only by the employees and senior management but not its clients or third parties. Which of the following cloud models would you choose? A: a community cloud B: a hybrid cloud C: a private cloud D: a public cloud

A private cloud

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address? A: AA B: FE10 C: 2680 D: 1

AA

A client has hired you to help him with a client-server application for windows so that he is able to transfer files. Which of the following applications will you suggest so the client can transfer such files between two computers? A: CuteFTP B: oracle database C: MySQL D: Nginx

CuteFTP

Mr. Walker. Plans on manufacturing a new line of twisted-pair cables for ethernet networks. To do so and to compete with other brands, circulating in the market, he hast to get his cable qualified as per certain standards. Which of the following points should he emphasize to get his cable TIA/EIA certified? A: twist ratio B: less attenuation C: effective throughput D: minimal crosstalk

Effective throughput

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud? A: VPN (virtual private network) B: Internet C: remote access connection D: leased Line

Internet

What information does the switch port port-security command used to restrict access to a switch's interface? A: MAC address B: port number C: IP address D: broadcast address

MAC address

With which network connection type does a VM obtain IP address in information from its host? A: bridged mode B: managed mode C: NAT mode D: isolation mode

NAT mode (Nettwerk address translation) mode

Glenn, who is working as a network engineer, has been instructed to automate many tasks to work together in a complex and lengthy workflow. What is the term for this process? A: cloud computing B: multitenacy C: orchestration D: automation

Orchestration

Which cloud service model gives software developers, access to multiple platforms for testing code? A: IaaS B: PaaS C: SaaS D: XaaS

PaaS (platform as a service)

Which of the following protocols can detect and correct link failures in milliseconds? A: TRILL B: RSTP C: CARP D: SPB

RSTP

Which of the following features of a network connection between a switch, and a server is NOT approved by link aggregation? A: bandwidth B: fault tolerance C: speed D: availability

Speed

You as a network analyst want to make certain changes to a VLA,N database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use? A: MTU B: SAID C: VLAN hopping D: Stack Master

Stack master

An attack has been detected in your network system by one of the network engineers. Analyzing the attack. Can you come to know that the system was accessed by the network. What kind of an attack has been experienced in this scenario? A: VLAN isolation B: switch spoofing C: incorrect port mode D: double tagging

Switch spoofing

Which of the following protocols, transfers files without any authentication or security? A: VPN B: FTPS C: TFTP D: SFTP

TFTP

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section over an IPv4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way? A: the second bit B: the fourth bit C: the first bit D: the third bit

The third bit

Which type of switch connects all devices in a rack to the rest of the network? A: ToR switch B: spine switch C: EoR switch D: core switch

ToR (top of rack) switch

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection? A: high bandwidth B: flexible routing C: untagged frames D: minimize latency

Untagged frames

What virtual, logically defined device operate, primarily at the data link layer to pass frames between nodes? A: virtual firewall B: virtual switch C: virtual router D: virtual load balancer

Virtual switch

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation? A: storm control B: a root port C: an SDN controller D: a layer 3 switch

a layer 3 switch

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load? A: redundancy B: a load balancer C: an SDN controller D: CARP

a load balancer

Which of the following terms refers to the technique of grouping redundant resources, such as servers, so they appear as a single device on the rest of the net work? A: use of hot-swappable parts B: clustering C: load balancing D: automatic failover

automatic failover

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario? A: isolated VLAN B: voice VLAN C: community VLAN D: management VLAN

community VLAN

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization? A: management VLAN B: voice VLAN C: default VLAN D: private VLAN

default VLAN

Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant, processors, backup, generators, and earthquake resilient installation. You've decided that the average downtime per year cannot be more than five minutes 15 seconds. Which of the following will you use in this scenario? A: four 9's B: two 9's C: five 9's D: three 9's

five 9's

When shopping for a new router, what does the MTBF tell you? A: how long until the device fails B: how much it will cost to repair that device C: how long devices like this one will last on average until the next failure D: how long it will usually take to repair that device

how long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer? A: hypervisor B: NFV C: SDN D: terminal emulation

hypervisor

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet? A: iSCSI B: FCoE C: IB D: FC

iSCSI

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation? A: VLAN isolation B: incorrect VLAN assignment C: double tagging D: incorrect port mode

incorrect port mode

Which device can manage traffic to multiple servers in a cluster so I'll servers equally share the traffic? A: router B: firewall C: switch D: load balancer

load balancer

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involves him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze, which of the following utilities should Robert used to determine the traffic going in and out of each NIC. A: tcpdump B: arp C: netstat D: traceroute

netstat

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved. A: open up port 1521 B: open up port 389 C: open up port 1433 D: open up port 5061

open up port 1433

Britain Airways has complained of a faulty NIC as a result of which they are having connectivity issues within the organization. You, as a senior technician, want to find out the manufacturer of the NIC so that you can submit a report of constant bugs in their device. Which of the following addresses will help you to identify the manufacturer of the NIC? A: extension identifier B: organizationally unique identifier C: IP address D: transport layer ports

organizationally unique identifier

Which of the following server racks would you use for a bolt-free mounting? A: non-threaded racks B: square-hole racks C: threaded racks D: round-hole racks

square-hole racks

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up net work at Delta Innovations. Which of the following cables will you use in the scenario to connect the workstation to a switch? A: rollover cable B: straight-through cable C: crossover cable D: fiber-optic cable

straight-through cable

Are the headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Matthews is the head of the network administration department in BBK solutions, and he hast to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as a primary focus? A: all the LAN ranges should be excepted on each trunk B: the default VLAN should not be used C: the native VLAN should be changed to a used VLAN ID D: auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled

the default VLAN should not be used

Which of the following planes is made up of the physical or virtual devices that receive and send net work messages on their way to their destinations? A: the management plane B: the infrastructure plane C: the application plane D: the control plane

the infrastructure plane

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario? A: trunking B: access port C: data VLAN D: inter-VLAN routing

trunking

Valentina is employed under the network management team at Iris Global Services, which is a software management firm. Following a recent hacking attempt at its office, the network administrator wants her to cross-check whether security precautions have been enabled on the STP interfaces so that the information transmitted by the BPDUs can be protected. On inspection, she discovers that the security precautions have not been configured. Analyze what Valentina should do in order to prevent a rogue switch or computer connected to one of these ports from hijacking the network's STP paths. A: use a BPDU guard to block BPDUs B: use the shut down command to disable, unused ports C: use a route guard on the switches D: use a BPDU filter to disable STPs

use a BPDU guard to block BPDUs


Set pelajaran terkait

Logic and Critical Thinking Chapter 1 Study Guide

View Set

Week 6: Drugs for Lipid Disorders

View Set

Intellectually disabilities Test 3

View Set

Interpersonal Communications Terms (Chapter 1, 3-6)

View Set