Neti 104 Module 4
You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance? Link aggregation Flow control Change the MTU to 1300 Jumbo frames Spanning tree
Jumbo frames
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1
Layer 3
Which DNS record needs to be configured for a network load balancing cluster? CNAME record An A record MX record TXT record
An A record
Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Encryption b. Message integrity c. Authentication d. Key distribution
Encryption
A wireless router holds its configuration information on which type of storage? SSD RAM Firmware This depends on the manufacturer
Firmware
Which one of the following wireless transmission types requires a clear LOS to function? a. Wi-Fi b. NFC c. IR d. Bluetooth
IR
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Firewall b. Load balancer c. Router d. Switch
Load balancer
What information does the switchport port-security command use to restrict access to a switch's interface? a. MAC address b. IP address c. Broadcast address d. Port number
MAC address
With which network connection type does the VM obtain IP addressing information from its host? a. Bridged mode b. Managed mode c. NAT mode d. Isolation mode
NAT mode
Merging physical and virtual network architecture is known by what acronym? NFV SDN Paas HVD
NFV
You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports? Jumbo frames Port mirroring Flow control MAC address filtering Port security
Port security
Which cloud service model gives software developers access to multiple platforms for testing code? a. XaaS b. PaaS c. SaaS d. IaaS
PaaS
To ensure the high availability of a resource, what needs to be configured? NIC Teaming Unicast Multipathing Network Load balancing
NIC Teaming, Multipathing, Network Load Balancing
What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames? Stop and wait mechanism Spanning tree Port security Flow control Link aggregation
Flow control
What needs to be done with a newly added network adapter to be able to configure NIC teaming? Configure the adapter to receive an IP address from a DHCP server dynamically Configure the adapter just with a DNS server Configure the adapter with a static IP address in the correct range Leave all configurations as default
Configure the adapter with a static IP address in the correct range
You are configuring wireless routers for your company. They are a mix of new and used routers of the same brand and model. Based on the information in the lab, which IP address will you use to access the router? 192.168.0.1 192.168.1.1 192.168.0.0 192.254.0.1
192.168.0.1
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ax c. 802.11b d. 802.11ac
802.11ax
A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file web and database servers be best managed? Clustering Failover Neither of these Both of these
Both of these
Which protocol replaced TKIP for WPA2? a. WEP b. CCMP c. RC4 d. RADIUS
CCMP
Which Carrier Sense technology is used on wireless networks to reduce collisions? a. CSMA/CD b. EAPoL c. SSID d. CSMA/CA
CSMA/CA
When you change the wireless 2.4GHz and 5GHZ credential, how would this affect the actions of a hacker? Cannot access network Cannot access router Can access router Cannot access anything
Can access router
What is the functionality of multipathing? [Choose all that apply] Share the network traffic load for a server Ensure a resource is highly available Team two network adapters together Create different network routes to a resource on the network
Ensure a resource is highly availableCreate different network routes to a resource on the network
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Brute force attack b. Guest network c. Evil twin d. Captive portal
Evil twin
When shopping for a new router, what does the MTBF tell you? a. How long devices like this one will last on average until the next failure b. How long it will usually take to repair that device c. How long until that device fails d. How much it will cost to repair that device
How long devices like this one will last on average until the next failure
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. Hypervisor b. SDN (software-defined networking) c. Terminal emulation d. NFV (Network Functions Virtualization)
Hypervisor
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? a. RSSI b. Channel c. Band d. EIRP
RSSI
You are configuring wireless routers for your company. The are a mix of new and used routers of the same brand and model. You unbox the first one, connect it and use the default credentials to login and use the default credentials to login. Access is denied. What do you do? Remove power, wait and reconnect Reset the router Try a different Ethernet cable All of these will work
Reset the router
You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? a. War driving b. Rogue AP c. Hidden node d. Evil twin
Rogue AP
What is the key drawback of STP or per VLAN STP - PVST? Slow convergence They do not have any drawbacks and are mostly used today They cannot provide loop free environment link RSTP or RPSTP Fast convergence Complicated configuration
Slow convergence
Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Bandwidth b. Speed c. Fault tolerance d. Availability
Speed
Which IP address will be used to connect a resource after Network Load balancing has been configured? The DNS server's IP address The Cluster's IP address A DHCP assigned IP address The individual hosts' IP addresses
The Cluster's IP address
Which type of switch connects all devices in a rack to the rest of the network? a. ToR switch b. Core switch c. EoR switch d. Spine switch
ToR switch
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual load balancer b. Virtual firewall c. Virtual switch d. Virtual router
Virtual switch
What happens when you save a new administrative username and password on a router? More settings are available You are logged out You need to reset the router Nothing
You are logged out
Which of the following wireless technologies does not use the 2.4 GHz band? a. Wi-Fi b. Z-Wave c. ZigBee d. Bluetooth
Z-Wave
You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode? configure terminal vlan-voice 10name VOICE configure terminal voice vlan 10name VOICE configure terminal vlan 10name VOICE configure terminal vlan voice 10name VOICE
configure terminal vlan 10name VOICE