Neti 104 Module 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance? Link aggregation Flow control Change the MTU to 1300 Jumbo frames Spanning tree

Jumbo frames

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1

Layer 3

Which DNS record needs to be configured for a network load balancing cluster? CNAME record An A record MX record TXT record

An A record

Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Encryption b. Message integrity c. Authentication d. Key distribution

Encryption

A wireless router holds its configuration information on which type of storage? SSD RAM Firmware This depends on the manufacturer

Firmware

Which one of the following wireless transmission types requires a clear LOS to function? a. Wi-Fi b. NFC c. IR d. Bluetooth

IR

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Firewall b. Load balancer c. Router d. Switch

Load balancer

What information does the switchport port-security command use to restrict access to a switch's interface? a. MAC address b. IP address c. Broadcast address d. Port number

MAC address

With which network connection type does the VM obtain IP addressing information from its host? a. Bridged mode b. Managed mode c. NAT mode d. Isolation mode

NAT mode

Merging physical and virtual network architecture is known by what acronym? NFV SDN Paas HVD

NFV

You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports? Jumbo frames Port mirroring Flow control MAC address filtering Port security

Port security

Which cloud service model gives software developers access to multiple platforms for testing code? a. XaaS b. PaaS c. SaaS d. IaaS

PaaS

To ensure the high availability of a resource, what needs to be configured? NIC Teaming Unicast Multipathing Network Load balancing

NIC Teaming, Multipathing, Network Load Balancing

What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames? Stop and wait mechanism Spanning tree Port security Flow control Link aggregation

Flow control

What needs to be done with a newly added network adapter to be able to configure NIC teaming? Configure the adapter to receive an IP address from a DHCP server dynamically Configure the adapter just with a DNS server Configure the adapter with a static IP address in the correct range Leave all configurations as default

Configure the adapter with a static IP address in the correct range

You are configuring wireless routers for your company. They are a mix of new and used routers of the same brand and model. Based on the information in the lab, which IP address will you use to access the router? 192.168.0.1 192.168.1.1 192.168.0.0 192.254.0.1

192.168.0.1

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ax c. 802.11b d. 802.11ac

802.11ax

A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file web and database servers be best managed? Clustering Failover Neither of these Both of these

Both of these

Which protocol replaced TKIP for WPA2? a. WEP b. CCMP c. RC4 d. RADIUS

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions? a. CSMA/CD b. EAPoL c. SSID d. CSMA/CA

CSMA/CA

When you change the wireless 2.4GHz and 5GHZ credential, how would this affect the actions of a hacker? Cannot access network Cannot access router Can access router Cannot access anything

Can access router

What is the functionality of multipathing? [Choose all that apply] Share the network traffic load for a server Ensure a resource is highly available Team two network adapters together Create different network routes to a resource on the network

Ensure a resource is highly availableCreate different network routes to a resource on the network

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Brute force attack b. Guest network c. Evil twin d. Captive portal

Evil twin

When shopping for a new router, what does the MTBF tell you? a. How long devices like this one will last on average until the next failure b. How long it will usually take to repair that device c. How long until that device fails d. How much it will cost to repair that device

How long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. Hypervisor b. SDN (software-defined networking) c. Terminal emulation d. NFV (Network Functions Virtualization)

Hypervisor

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? a. RSSI b. Channel c. Band d. EIRP

RSSI

You are configuring wireless routers for your company. The are a mix of new and used routers of the same brand and model. You unbox the first one, connect it and use the default credentials to login and use the default credentials to login. Access is denied. What do you do? Remove power, wait and reconnect Reset the router Try a different Ethernet cable All of these will work

Reset the router

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? a. War driving b. Rogue AP c. Hidden node d. Evil twin

Rogue AP

What is the key drawback of STP or per VLAN STP - PVST? Slow convergence They do not have any drawbacks and are mostly used today They cannot provide loop free environment link RSTP or RPSTP Fast convergence Complicated configuration

Slow convergence

Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Bandwidth b. Speed c. Fault tolerance d. Availability

Speed

Which IP address will be used to connect a resource after Network Load balancing has been configured? The DNS server's IP address The Cluster's IP address A DHCP assigned IP address The individual hosts' IP addresses

The Cluster's IP address

Which type of switch connects all devices in a rack to the rest of the network? a. ToR switch b. Core switch c. EoR switch d. Spine switch

ToR switch

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual load balancer b. Virtual firewall c. Virtual switch d. Virtual router

Virtual switch

What happens when you save a new administrative username and password on a router? More settings are available You are logged out You need to reset the router Nothing

You are logged out

Which of the following wireless technologies does not use the 2.4 GHz band? a. Wi-Fi b. Z-Wave c. ZigBee d. Bluetooth

Z-Wave

You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode? configure terminal vlan-voice 10name VOICE configure terminal voice vlan 10name VOICE configure terminal vlan 10name VOICE configure terminal vlan voice 10name VOICE

configure terminal vlan 10name VOICE


Set pelajaran terkait

Macroeconomics Final Exam Review

View Set

3B Review - Carbon-based Chemistry

View Set

SHRM-CP - MANAGEMENT & ORGANIZATIONAL BEHAVIOR TEST

View Set

18th Century Art and Architecture

View Set

molecular biology week 2 (9/5/22)

View Set