Networking + 7
What is the functionality of multipathing? [Choose all that apply] Team two network adapters together Ensure a resource is highly available Create different network routes to a resource on the network Share the network traffic load for a server
Ensure a resource is highly available Create different network routes to a resource on the network
In which type of cloud configuration is the customer responsible for maintaining the operating system and software? Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Software as a Service (SaaS) Desktop as a Service (DaaS)
Infrastructure as a Service (IaaS)
Which IP address will be used to connect a resource after Network Load balancing has been configured? The individual hosts' IP addresses The DNS server's IP address The Cluster's IP address A DHCP assigned IP address
The Cluster's IP address
Which type of switch is best used for connections to web servers? a. Edge switch b. Core switch c. Spine switch d. Aggregation switch
a. Edge switch
With which network connection type does the VM obtain IP addressing information from its host? a. Isolation mode b. Bridged mode c. NAT mode d. Managed mode
c. NAT mode
Which type of switch connects all devices in a rack to the rest of the network? a. EoR switch b. Core switch c. ToR switch d. Spine switch
c. ToR switch
What is the key drawback of STP or per VLAN STP - PVST? Fast convergence Slow convergence Complicated configuration They do not have any drawbacks and are mostly used today They cannot provide loop free environment link RSTP or RPSTP
Slow convergence
The traffic that enters into a network is known as the ___________ traffic. Southbound Northbound East West
Southbound
Which STP bridge serves as the basis for all path calculations? a. Designated bridge b. Root bridge c. Spanning bridge d. Header bridge
b. Root bridge
Which cloud management technique executes a series of tasks in a workflow? a. Orchestration b. Automation c. IaC d. SLA
a. Orchestration
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. SDN (software-defined networking) b. Hypervisor c. Terminal emulation d. NFV (Network Functions Virtualization)
b. Hypervisor
When choosing the location to create resources in the cloud, what is the best location for the resources? [Choose all that apply] UK South UK West Closest Regional Cloud Service Provider Datacenter Geographically closest Cloud Service Provider Datacenter East US
Closest Regional Cloud Service Provider Datacenter Geographically closest Cloud Service Provider Datacenter
You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance? Spanning tree Jumbo frames Link aggregation Flow control Change the MTU to 1300
Jumbo frames
Which of the following is an example of Software as a Service (SaaS)? [Choose all that apply] SharePoint Server 2016 Microsoft 365 Microsoft Exchange 2019 Dropbox
Microsoft 365 Dropbox
When you set private IP address ranges for servers in your cloud, what service model are you using? a. DaaS b. IaaS c. SaaS d. PaaS
b. IaaS
Whale Telecommunications has hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per month cannot be more than 4 minutes and 22 seconds. Which of the following will you use in this scenario? Two 9s Five 9s Three 9s Four 9s
Four 9s
Which of the following are also known as content switches or application switches? ToR switches Layer 3 switches EoR switches Layer 4 switches
Layer 4 switches
Which tier in the three-tiered network is responsible for routing traffic in and out of a network? Distribution Core Edge Aggregation
x(Core) notes say distribution layer
You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand? A root guard A BPDU guard A root bridge A BPDU filter
A BPDU filter
Which DNS record needs to be configured for a network load balancing cluster? MX record An A record CNAME record TXT record
An A record
How many tiers are there in the spine and leaf network architecture? 2 4 1 3
2
At which layer in Software Defined Network (SDN) will you find a firewall? Infrastructure Layer Application Layer Management Plane Layer Control Layer
Application Layer
Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices? Internet Small Computer Systems Interface (iSCSI) Fibre Channel over Ethernet (FCoE) Fibre Channel Arbitrated loop (FC-AL)
Internet Small Computer Systems Interface (iSCSI)
To ensure the high availability of a resource, what needs to be configured? NIC Teaming Multipathing Unicast Network Load balancing
Network Load balancing
You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports? MAC address filtering Port security Jumbo frames Port mirroring Flow control
Port security
With a _________ Cloud, the hardware and software are maintained by the company that owns it. Hybrid Public Community Private
Private
In which of the following cloud models is service provided over public transmission lines? Private cloud Hybrid cloud Community cloud Public cloud
Public cloud
Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands? Measured service Rapid elasticity Broad network access Resource pooling
Rapid elasticity
What is the advantage of elasticity when utilizing a cloud service provider? [Choose all that apply] Resources are deleted when not used Resources are deallocated when not used Resources are created automatically Resource allocation is scaled automatically
Resources are deallocated when not used Resource allocation is scaled automatically
Which of the following protocols keeps all potential paths active while managing the flow of data across the paths to prevent loops? CARP TRILL RSTP SPB
SPB
Which of the following layers will be used by an SDN controller to communicate with network applications using APIs (application programming interfaces)? The control plane The management plane The infrastructure plane The application plane
The application plane
Lifecare Insurance has plans to upgrade its enterprise grade network for better performance and to protect the network from problems whenever one or more network devices fail because of higher volumes of traffic. Rose is hired as a network administrator to oversee the change and to ensure that every device can function at its best without being swamped with too many kinds of tasks. After having a close look at the process, Rose is of the opinion that some of the devices are overburdened by heavy traffic, as a result of which they are unable to perform at full capacity. Analyze which step Rose should take to fix the issue at hand. Use top of rack switching to fix the issue. Try to fix the issue at the core layer of the three-tiered architecture. Use a SDN to distribute the traffic load. Use a load balancer to fix the issue.
Use a load balancer to fix the issue.
Which network architecture technique are you using when you run a virtual router on a network? a. NFV b. SAN c. STP d. SDN
a. NFV NFV (Network Functions Virtualization) is a network architecture that merges physical and virtual network devices. STP (Spanning Tree Protocol) is a switching protocol defined by the IEEE standard 802.1D that prevents traffic loops by artificially blocking the links that would complete a loop. A SAN (storage area network) is a distinct network of storage devices that communicate directly with each other and with other portions of the network. SDN (software-defined networking) is a centralized approach to networking that removes most of the decision-making power from network devices and instead handles that responsibility at a software level.
Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Speed b. Availability c. Bandwidth d. Fault tolerance
a. Speed
Which cloud characteristic ensures you can manage cloud resources from an iPad? a. Resource pooling b. Broad network access c. Multitenancy d. Rapid elasticity
b. Broad network access means client devices of all types can access services, applications, and storage in a cloud, no matter what operating system they run or where they are located, if they have an Internet connection
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Router b. Firewall c. Load balancer d. Switch
c. Load balancer
What information does the switchport port-security command use to restrict access to a switch's interface? a. IP address b. Broadcast address c. MAC address d. Port number
c. MAC address
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual load balancer b. Virtual firewall c. Virtual switch d. Virtual router
c. Virtual switch
Which SAN connection technology can run over ordinary Ethernet NICs without any special equipment needed? a. SATA b. FC c. iSCSI d. IB
c. iSCSI
When shopping for a new router, what does the MTBF tell you? a. How long it will usually take to repair that device b. How much it will cost to repair that device c. How long until that device fails d. How long devices like this one will last on average until the next failure
d. How long devices like this one will last on average until the next failure
You have been tasked with ensuring that the switches used in your organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you plan on enabling a MAC filtering function that will protect the Arista devices against MAC flooding. Which of the following commands will you use to bring your plan to action? port-security shutdown disable switchport port-security
switchport port-security
As a network administrator, you have to arrange a platform where the company's developers can load any kind of software on the servers, test it from afar, and share this content with distant members of the team. Which of the following will you use in this scenario? A SAN A CSP NFV SDN
A CSP
Which SDN plane moves traffic from switch port to switch port? a. Infrastructure plane b. Management plane c. Control plane d. Application plane
a. Infrastructure plane The infrastructure plane is made up of the physical or virtual devices that handle actual transmissions on the network, moving traffic from each port on a switch to other ports. The control plane handles the decision-making processes performed by network protocols. The application plane includes applications running on the network, such as DNS or VoIP. The management plane could be considered a part of the control plane and allows network administrators to remotely manage network devices, monitor those devices, and analyze data collected about the devices.
Which is longer for a reliable device? a. MTBF b. MTTR
a. MTBF This should be significantly longer than the MTTR (mean time to repair), which is the average amount of time required to repair a device once it fails.
You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. Which of the following command will you use on the global configuration mode? configure terminal | voice vlan 10 | name VOICE configure terminal | vlan voice 10 | name VOICE configure terminal | vlan-voice 10 | name VOICE configure terminal | vlan 10 | name VOICE
configure terminal | vlan 10 | name VOICE
Which virtual network connection type assigns a VM its IP address from the physical network? a. Host-only b. NAT c. Private d. Bridged
d. Bridged Although a bridged vNIC communicates through the host's adapter, it obtains its own IP address, default gateway, and subnet mask from a DHCP server on the physical LAN. In NAT mode, the VM obtains IP addressing information from its host rather than from a server or router on the physical network. In host-only mode, VMs use the DHCP service in the host's virtualization software to obtain IP address assignments. In Hyper-V, the host-only connection type is created by assigning VMs to a private virtual network.
Which protocol balances traffic across multiple links? a. LACP b. CARP c. VIP d. VRRP
a. LACP LACP (Link Aggregation Control Protocol) dynamically coordinates communications between hosts on aggregated connections
Which cloud service model gives software developers access to multiple platforms for testing code? a. IaaS b. PaaS c. SaaS d. XaaS
b. PaaS
What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames? Flow control Spanning tree Port security Link aggregation Stop and wait mechanism
Flow control
What needs to be done with a newly added network adapter to be able to configure NIC teaming? Configure the adapter just with a DNS server Leave all configurations as default Configure the adapter to receive an IP address from a DHCP server dynamically Configure the adapter with a static IP address in the correct range
Configure the adapter with a static IP address in the correct range