N10-007 Practice (Infrastructure)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN: Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN. Deploy two FC switches. Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs. Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.

1. Install two FC HBAs in each server that will access the shared storage on the SAN. 2. Deploy two FC switches. 3. Using fiber optic cables, connect each server to each FC switch. 4. Deploy shared storage devices. Typically, these are external RAID device containing multiple hard disk drives and two FC HBAs. 5. Using fiber optic cables, connect each storage device to each FC switch.

Your network follows the 100BaseFX specifications for Fast Ethernet and uses half-duplex multi-mode cable. What is the maximum cable segment length allowed? 100 meters 412 meters 550 meters 1,000 meters 2,000 meters

412 meters

Which of the following WAN technologies provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps? ISDN POTS Frame relay X.25

Frame relay

You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter? ST F-Type BNC RJ11

BNC

F-type connectors are typically used with which of the following cable standards? (Select two.) RG-58 Cat 6a Cat 5 RG-6 RG-59 Cat 5e

RG-6 RG-59

You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation? 1000BaseZX 1000BaseLX 1000BaseSX 10BaseFL 1000BaseT 1000BaseCX

1000BaseCX

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.) 1000BaseCX 10GBaseER 10BaseFL 10GBaseSR 1000BaseSX 1000BaseT

10GBaseSR 1000BaseSX

What is the maximum data rate of an ISDN BRI line? 64 Kbps 256 Kbps 128 Kbps 1.544 Mbps

128 Kbps

You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub? 550 meters 100 meters 412 meters 220 meters 2000 meters 1000 meters

2000 meters

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the main floor. You need to connect the two wiring closets. Which of the following are typically used to connect the two wiring closets? (Select two.) 25 pair Smart jack Demarc extension Horizontal cross connect Vertical cross connect

25 pair Horizontal cross connect

You have installed an ISDN connection into your home so you can connect to the internet and talk on the phone at the same time. While you are talking on the telephone, what is the maximum data rate of your internet connection? 64 Kbps 1.544 Mbps 128 Kbps 56.8 Kbps

64 Kbps

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the second floor. What could cause this to happen? Two hosts on the network with the same MAC address. Collisions between two or more network hosts. An incorrect subnet mask configured on the workstation. A strong EMI emitter near the cable run connected to that interface.

A strong EMI emitter near the cable run connected to that interface.

What is the minimum cable specification that supports 1000 Mbps Ethernet? Cat 3 Cat 4 Cat 5 Cat 5e Cat 6 Cat 7

Cat 5e

You want to create a loopback plug using a single RJ45 connector. How should you connect the wires in the connector? Connect pin 1 to pin 3 and pin 2 to pin 6. Connect pin 1 to pin 3 and pin 2 to pin 4. Connect pin 1 to pin 5 and pin 2 to pin 6. Connect pin 1 to pin 8 and pin 2 to pin 7. Connect pin 1 to pin 2 and pin 3 to pin 3.

Connect pin 1 to pin 3 and pin 2 to pin 6.

Ethernet 100BaseFX networks use what type of cabling? Fiber optic Coaxial Shielded twisted pair Unshielded twisted pair

Fiber optic

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution.) Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces. Create a new virtual switch configured for host-only (internal) networking. Disconnect the network cable from the hypervisor's network interface. Create a new virtual switch configured for bridged (external) networking. Disable the switch port that the hypervisor's network interface is connected to. Connect the virtual network interfaces in the virtual machines to the virtual switch.

Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.

You have a network that occupies the top floor of a three-story building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor? Demarc extension 66 block Horizontal cross connect Smart jack 110 block

Demarc extension

As a security precaution, you have implemented IPsec between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement? Protocol analyzer Port scanner VPN concentrator Network-based IDS Host-based IDS

Host-based IDS

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.) How many devices will need to be supported? What type of data will be transmitted on the network? Where can network hardware be mounted in the building? Are there microwaves or cordless phones that can cause interference? Is the size of the business expected to grow in the future?

How many devices will need to be supported? What type of data will be transmitted on the network? Is the size of the business expected to grow in the future?

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor? Demarc extension IDF Vertical cross connect MDF Horizontal cross connect

IDF

Which of the following are security devices that perform stateful inspection of packet data, looking for patterns that indicate malicious code? (Select two.) Firewall ACL IPS IDS VPN

IPS IDS

Which WAN connection types use digital communications over POTS? (Select two.) ATM ISDN 56 Kbps dialup X.25 DSL SONET

ISDN DSL

Which of the following WAN technologies is a dial-up only service? T1 ISDN BRI FDDI OC1

ISDN BRI

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Implement a virtual firewall within the hypervisor. Route VM-to-VM traffic through a physical firewall and back to the virtual network. Define VLAN memberships on each VM. Create a virtual router with VRF technology.

Implement a virtual firewall within the hypervisor.

Which of the following is true of Multiprotocol Label Switching? (Select two.) It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers. Packets routed using MPLS require additional routing lookup overhead. MPLS-enabled routers switch packets based on the packet contents, not on label information. It is designed to forward only packets created with the TCP/IP protocol.

It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.

Which of the following statements accurately describes how a modem works? (Select two.) It demodulates analog PC data into digital data that can be transmitted through a telephone network. It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps. It communicates over a telephone network using digital signals. It modulates digital data from the PC into analog data and transmits it on a telephone network. It modulates digital data from a telephone network into analog data that a PC can use. It demodulates analog data from a telephone network into digital PC data.

It modulates digital data from the PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data.

Which of the following statements about the functionality of LCP are true? (Select three.) LCP provides multilink support. Data can be compressed at the source and decompressed at the destination. LCP provides remote terminal access in public data networks. LCP encapsulates multiple protocols. Usernames and passwords may be required during the handshake. LCP is responsible for logical addressing in PPP.

LCP provides multilink support. LCP encapsulates multiple protocols. Data can be compressed at the source and decompressed at the destination.

What is one benefit of placing VoIP gateways in geographically separated branch offices that have an existing WAN connection? Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred. Data can be transported between VoIP gateways over the PSTN instead of via the expensive WAN. VoIP gateways can aggregate multiple VoIP calls for more efficient transmission to the home office. Less costly VoIP gateways can be used in place of expensive routers and modems to provide WAN connectivity.

Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred.

Which of the following is true of Multiprotocol Label Switching? (Select two.) MPLS is designed to work with many different protocols. MPLS requires that all devices be configured with the same routing protocol. MPLS support is limited to Ethernet traffic. MPLS-enabled routers switch packets based on the label information, not on the packet contents. Packets routed using MPLS require additional routing lookup overhead.

MPLS is designed to work with many different protocols. MPLS-enabled routers switch packets based on the label information, not on the packet contents.

What key advantage does a virtual router have over a physical router? Routing protocols are not necessary for routing data between networks. Multiple networks can be connected to a single interface. Allows the virtual router redundancy protocol (VRRP) to be used. Faster routing performance.

Multiple networks can be connected to a single interface.

PPP supports authentication, compression, and multiple Network layer protocols. Which of the following correctly sequences these functions when a PPP link is established? Perform authentication, negotiate Network layer protocols, negotiate compression settings Negotiate compression settings, perform authentication, negotiate Network layer protocols Negotiate compression settings, negotiate Network layer protocols, perform authentication Negotiate Network layer protocols, perform authentication, negotiate compression settings Negotiate Network layer protocols, negotiate compression settings, perform authentication Perform authentication, negotiate compression settings, negotiate Network layer protocols

Negotiate compression settings, perform authentication, negotiate Network layer protocols

Which of the following are benefits of LCP? (Select three.) Provides logical addressing for the data link layer Negotiates the use (or lack) of authentication before starting the session Monitors data dropped on the link and avoids frame looping Provides physical addressing for the data link layer Provides load balancing across multiple links

Negotiates the use (or lack) of authentication before starting the session Monitors data dropped on the link and avoids frame looping Provides load balancing across multiple links

Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices, and compatibility is a concern. Which WAN encapsulation method should you recommend your client use? PAP PPP Cisco HDLC Ethernet

PPP

Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports? 110 block Patch panel Horizontal cross connect 66 block

Patch panel

Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network? (Select two.) Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8

Pin 1 Pin 2

What tool should you use to extend network services beyond the demarc? Tone generator Media certifier Punch down tool Crimper

Punch down tool

Which of the following connector types would you most likely use to connect to a T1 WAN service? RJ11 GG45 RJ48c RJ45

RJ48c

RouterA is connected to RouterB through Serial1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which set of commands would you use on RouterA to complete the configuration? RouterA(config)#int s1 RouterA(config-if)#encap ppp auth chap password cisco RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap password cisco RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp chap username RouterA password cisco RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap RouterA(config-if)#ppp chap username RouterB password cisco RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap RouterA(config)#username RouterB password cisco

RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap RouterA(config)#username RouterB password cisco To complete this configuration, you need to: 1. Identify the interface you want to configure with the int s1 command. 2. Set PPP encapsulation with the encapsulation command. 3. Set the PPP authentication to CHAP with the ppp authentication command. 4. Identify RouterB and the password with the username command.

Which of the following is a characteristic of SDSL? Unequal download and upload speeds Speeds up to 100 Mbps Requires splitters on the line Supports data traffic only (no voice)

Supports data traffic only (no voice)

Which of the following correctly describes the T1 carrier system? (Select two.) T1 lines use two pairs of copper wire. T1 lines have a maximum data rate of 2.4 Gbps. T1 lines use 48 separate channels. T1 lines use four pairs of copper wire. T1 lines use analog signaling between the customer-premise unit and the ISP. A single T1 channel can transfer data at 64 Kbps.

T1 lines use two pairs of copper wire. A single T1 channel can transfer data at 64 Kbps.

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.) Channel TKIP encryption Preshared key BSSID AES encryption

TKIP encryption Preshared key

Which of the following are characteristics of an LC fiber optic connector? (Choose two.) They are half the size of standard connectors. They use a one-piece bayonet connecting system. They can be used with either fiber optic or copper cabling. They use a housing and latch system similar to an RJ45 UTP connector. They are threaded.

They are half the size of standard connectors. They use a housing and latch system similar to an RJ45 UTP connector.

Which of the following are characteristics of an MTRJ fiber optic connector? (Select two.) They can be used with multi-mode fiber optic cables. They use a keyed bayonet. They must never be used with single-mode fiber-optic cables. They use metal guide pins to ensure accurate alignment. They are used with multi-fiber fiber optic ribbon cables.

They can be used with multi-mode fiber optic cables. They use metal guide pins to ensure accurate alignment.

Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.) 23 B channels operating at 64 Kbps each Two B channels operating at 64 Kbps each One D channel operating at 64 Kbps One D channel operating at 16 Kbps

Two B channels operating at 64 Kbps each One D channel operating at 16 Kbps

An active IDS system often performs which of the following actions? (Select two.) Trap and delay the intruder until the authorities arrive. Request a second logon test for users performing abnormal activities. Update filters to block suspect traffic. Perform reverse lookups to identify an intruder.

Update filters to block suspect traffic. Perform reverse lookups to identify an intruder.

Which of the following are characteristics of ATM? (Select two.) Uses fixed-length cells of 53 bytes. Supports variable-length packets. Uses POTS in the local loop. Connects to the WAN cloud with a CSU/DSU. Adds labels to data units.

Uses fixed-length cells of 53 bytes. Supports variable-length packets.

Which component is most likely to allow physical and virtual machines to communicate with each other? Host operating system Virtual switch VHD Virtual desktop

Virtual switch

Which of the following are the the WAN service provider's responsibility to maintain? (Select three.) DTE CO Local loop CPE CO Local loop

WAN service providers are responsible for: Packet switching exchange (PSE)—equipment inside the WAN cloud. Central office (CO)—equipment that allows access to the PSE. Local loop—wiring that connects the customer to the CO. Customers are responsible for: Customer premises equipment (CPE)—any equipment at the customer site. Data terminal equipment (DTE)—devices that send local data to the WAN.

When would you consider changing the codec used in your VoIP system? (Select two.) When network latency causes callers to talk over each other. When excessive jitter causes unusual sound effects in VoIP calls. When sound quality is poor. When an open source VoIP protocol requires a different codec. When VoIP data consumes too large a portion of your network bandwidth.

When sound quality is poor. When VoIP data consumes too large a portion of your network bandwidth.

You are connecting Cat 5e cables to a 110 block. What order should you connect the wires in to follow standard wiring conventions? White/blue, blue, white/orange, orange, white/green, green, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/brown, brown, white/blue, blue, white/orange, orange, white/green, green

White/blue, blue, white/orange, orange, white/green, green, white/brown, brown

You want to use the T568A standard to add connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/blue, blue, white/orange, orange, white/green, green, white/brown, brown

White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/blue, blue, white/orange, orange, white/green, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

In a SAN implementation, the servers that connect to shared storage devices are called __________.

initiators


Set pelajaran terkait

Blind Practice Test(Missed Questions)

View Set

Chapter 11: Learning, Memory, and Amnesia

View Set

ECON 111- Money and Monetary Policy

View Set

Management Chapter 3 Practice Questions

View Set