Networking Final Exam Quizlet

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?

-80 dBm

Which switch can be configured via a command-line interface or a web-based management GUI?

A managed switch

In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?

On-path attack

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved

Open up port 1433

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use?

225.225.225.240

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

225.225.240.0

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?

25

What is the downtime per day for a system showing 99.9% availability?

1 minute and 26 seconds

As a network engineer, you have been tasked to form a Gigabit Ethernet for connecting a data center with a data closet in an office building. Identify which of the following fiber Ethernet standards would you apply in this situation

1000BASE-FX

Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement?

100GBASE-T

What is the maximum allowable distance for horizontal cabling?

100m

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 Class C Subnet Mask?

14

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

14

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

225.225.225.224

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

255.254.0.0

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.224

If a twisted-pair cable has a diameter of 0.8 cm, which of the following options would you apply as the bend radius of the cable so that data transmission is not impaired?

3.2 cm

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224

30

Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

300871

What is the secure port for HTTPS?

443

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue

5.925 GHz-7.125 GHz

The Mosiac Music School has hired Kirk to set up a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided?

5061

How many bits are used in a network with a subnet of 255.0.0.0?

8

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band?

802.11ax

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

802.11b

Identify which of the following statements is correct

A 32-bit IPv4 address is organized into 4 groups of 8 bits each

Identify which of the following statements is Correct

A 32-bit IPv4 address is organized into four groups of 8 bits each

Identify which of the following statements is Correct

A 32-bit IPv4 address is organized into four groups of 8 bits each.

Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (Spanning Tree Protocol) features that will block BPDUs (Bridge Protocol Data Units) on any port serving network hosts. Which of the following will he use for such purposes?

A BPDU guard

Which of the following manages the dynamic distribution of IP addresses to devices on a network?

A DHCP

Which of the following is a distinct network of storage devices that communicate directly with each other and with other portions of the network?

A SAN

Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario?

A combo device

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. Hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most?

A community cloud

Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files?

A disaster recovery plan

You are a junior technician at KVM Solutions. They have just received a query from a university who wants their network connection to be set up. You have been tasked with sketching a diagram for the various network devices that will be used to establish the connection. Which of the following options would you apply to identify the routers in that connection?

A hockey-puck shape with two arrows pointing inward and two arrows pointing outward

What is a graphical representation of network devices and connections known as?

A network diagram

The administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address?

A private port number

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). While setting up the network for one of your clients, he wants you to check whether sufficient security precautions have been taken to ensure none of the customer's switches becomes the ISP's root bridge. Which of the following will you use in this scenario to ensure that the appropriate security measures have been taken?

A root guard

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose

A star topology

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.

A star topology

A client who has a small office setup has complained about a faulty wired connection in their LAN as a result of which they are unable to use the broadband service to access the Internet. You, as a network technician, have to solve the matter. Which of the following will you need to access the situation?

A wiring diagram

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address?

AA

Which one of the following DNS record types holds the name-to-address mapping for IPv6 addresses?

AAAA records

Which form of communication is well suited to users who receive more information from the network than they send to it?

ADSL

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

You are employed as a network administrator of Vincent Motors. An unreleased blueprint of a new car model of Vincent Motors has been leaked on the Internet. You assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. Which of the following access control techniques will you use so that such an activity can be detected in the future?

Accounting

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender?

Acknowledgement number

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender?

Acknowledgment number

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers?

Active Directory

Which of the following is not a technique used in a closed-loop response to an existing congestion?

Admission Policy

Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

An MSA

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

An RFP

Which of the following statements stands true?

An email can be downloaded to the client computer using POP3.

Ground Movers Ltd., a courier service provider, has recently encountered certain breaches that have led to packages being stolen and damaged. The company has contracted you, a network analyst, to fix this issue. You plan on installing a device that will be able to provide constant or periodic collection of information. This information can then be used by the management control software for monitoring and reporting. Which of the following devices will you install for Ground Movers Ltd.?

Asset tags

Youhan has been placed as the security in charge of an organization. Which of the following should he use to monitor the movement and condition of equipment, inventory, and people?

Asset tags

Analyze which of the following can be used to establish a static VLAN assignment for a device

Assigning a VLAN based on the switch port the device is connected to

One of the employees in your organization is suspected of hacking into the network. You as a network administrator want to check the user's activity for the last week. Which of the following will you use in such a scenario?

Audit log

Hilary is an employee of Munich Securities. The HR manager has received a complaint from one of her fellow employees about her misusing her account. You as a network administrator want to conduct a user configuration check to ensure that there are no vulnerabilities to the network configuration. Which of the elements of the AAAA acronym will you use to apply this security measure?

Auditing

Which of the following terms refers to the technique of grouping redundant resources such as servers so they appear as a single device to the rest of the network?

Automatic failover

Which of the following methods requires the entry of a code to open a door?

Cipher Lock

Which of the following devices scans an individual's unique physical characters such as iris color patterns to verify the person's identity?

Biometrics

Donald is a schoolteacher living in Atlanta. While conducting online classes, he experienced a momentary decrease in voltage. His computer shut down and when he switched it back on, he realized that he had lost some data. He called his friend Chadwick who is a network analyst to check out what the issue was. Chadwick found that there was a power flaw caused by an overtaxed electrical system. Such voltage decreases can cause computers or applications to fail and potentially corrupt data. What kind of power flaw caused this issue in Donald's house?

Brownout

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?

CAN

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered?

CAN

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

CNAME record

While setting up a network segment, you want to check the functionality of a cable before putting connectors on them. You also want to measure the termination point or damage in the cable. Which of the following tools would you use to identify this?

Cable performance tester

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

Captive portal

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Cat 6a

Mr. Furland was hired as a network engineer at Secret Eye Corporations that is running a security camera outlet. While setting up a camera at one of the sites, he notices that the security camera has been mounted really high as a result of which there are no power receptacles to power up the device. So, Mr. Furland plans on powering these devices using an Ethernet cable. Which category of cable should he choose to power up the device?

Cat 7

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario?

Cat 7

James, a network engineer, has been contracted by a company to monitor network performance. In order to know and analyze any problem in a network, James will need to understand how the network functions in a normal state. Analyze which of the following will be of use to James in this scenario

Checking the network's performance baseline

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error

Checksum

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario?

Community VLAN

Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network?

Congestion control

For over a decade, Ramanathan has been working as a network engineer in an MNC that uses FC (Fibre Channel) networking architecture. His primary duty is to ensure that there are no issues in the network connections between servers and SAN (storage area network) devices, so that maximum throughput is achieved at all times. Recently, one of the connections of the FC device to the network malfunctioned, which Ramanathan has to fix. Analyze which of the following Ramanathan should do in this scenario

Connect the FC devices to the network through HBAs

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers?

CuteFTP

A DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the tar

DRDoS attack

Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

DRDoS attack

Which of the following devices contains ports to connect both to an incoming telephone line and to a computer or network connectivity device?

DSL modem

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels

DWDM

Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

Data VLAN

Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

Data VLANS

Game Zone is a well-known games park located in Manhattan that allows gamers to engage in multiplayer competitions. The competitions function smoothly on the opening day, but on the following days, there are multiple instances of the computers getting disconnected temporarily from the wireless network. These connections however function normally when they are reconnected. Which type of attack is this most likely to be?

Deauth attack

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

Diffraction

Which is a small file containing verified user's identification information and public key known as?

Digital certificate

Jilead Inc. is a software development company that is preparing an incident response plan to prepare for possible events such as a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale environmental disaster that shuts down businesses throughout the city or state. The response plan has identified the members of the response team and the responsibilities have been assigned and clearly spelled out to each team member. Stanley Hudson has been entrusted with the responsibility of being the person on call who first notices or is alerted to the problem. He has to create a record for the incident, detailing the time it began, its symptoms, and any other pertinent information about the situation. He must remain available at all times to answer calls from clients or employees. What is the role that Stanley has been assigned?

Dispatcher

Which of the following is not a social engineering strategy?

DoS

What is the logical group of Windows Servers controlling the network access to a group of computers also known by?

Domain

Silicone Printers has raised a ticket claiming that it was unable to view websites from its workstations, because with every attempted access, the system displayed an error message that read "there is another device using the same IP address." What would you, as a network engineer, check for in such a scenario?

Duplicate IP addresses

Which of the following ports range from 49152 to 65535 and are open for use without restriction?

Dynamic and private ports

Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?

EAP-TLS

Identify which router connects an autonomous system with an outside network, also called an untrusted network

Edge Router

The Cambridge Law Department has complained of a loss of network signal from time to time. On inspection, it has been noticed that the loss of signal is due to noise interference at the physical layer. Analyze which of the following measures should be taken to sort out this issue

Ensure that the cables are at least 3 feet away from fluorescent lights or other sources of EMI.

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

Ethernet

A router outside an organization's AS(autonomous system), such as a router on the Internet backbone?

Exterior router

The IT department of Mascom Telecom has requested you to fix an error that seems to have been associated with a possible malware attack. This particular malware file seems to have attacked the operating system files on the computer. Which of the following should you use to avoid or alert such an attack in the future?

FIM

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case

Multicast Address

You have recently been appointed as a network analyst at Hayle Communications. Your first assignment requires you to limit the traffic between a single receiver and a single sender. Which of the following bandwidth management techniques will you use in this scenario?

Flow control

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters?

Four hops

LTE (Long-Term Evolution) and LTE-A (LTE advanced) are variations of which generation of cellular network?

Fourth generation

You are working as a network engineer for an ISP. A ticket has been raised that states that the SMF (single mode fiber) and the MMF (multimode fiber) cables have come apart at the FDP (fiber distribution panel). On checking the situation, you realize that you will need to melt the tips of the two fibers together so that light can pass cleanly through the joint. Which of the following kits will you require in this scenario?

Fusion splicer

Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

GRE

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?

Geographic locations

Which of the following is an example of an industrial controls system?

HVAC

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?

He should check whether captive portal user reminders have been set up.

Kristen has plans of starting an online food delivery company. She plans on making the company one of the most secured portals for online food delivery. She hires Brad, a network consultant, to guide her through the necessary security protocols. Brad conducts all the necessary security checks and involves a white hat hacker too to point out any vulnerability that might be overlooked. Analyze if Brad needs to conduct any other risk assessment procedures in this scenario

He should conduct a vendor risk assessment.

What is the purpose of the TXT (text) DNS resource record?

Holds any type of free-form text

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case

Multicast address

A client contacted you to avail your services of cable installation. The requirement is to set up a connection which connects workstations to the data room, and the distance between them spans 87 meters. Which of the following cabling methods would be an ideal option for this assignment?

Horizontal Cabling

Which of the following cabling methods connects workstations to the closest data rooms?

Horizontal Cabling

A client contacted you to avail your services of cable installation. The requirement is to set up a connection which connects workstations to the data room, and the distance between them spans 87 meters. Which of the following cabling methods would be an ideal option for this assignment?

Horizontal cabling

What creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

Hypervisor

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

Hypervisor

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

IBSS

Which of the following institutions assigns a manufacturer's OUI?

IEEE

Katy, a senior technician, wants to document all the devices that are connected to the network of Ford Industries, which has a large complex network. She wants to ensure that all information in the network, including the hostnames, manufacturer names, operating systems, and IP addresses, are well-documented. Which of the following tools should she opt for to carry this out?

IP scanner

Which of the following provides a set of rules for encryption, authentication, and key mgt for TCP/IP transmissions?

IPSec

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Identify why the application is behaving in this manner and the symptoms behind such behavior; Identify why the application is behaving in this manner and the symptoms behind such behavior.

HomeLand is an organization that rescues abandoned dogs. They set up a hotline for the general public to report any street dog that they spot anywhere in the city or any dog that they feel needs to be rescued. Within 12 hours of the hotline being activated, the network starts experiencing congestion, messages are corrupted or dropped, and connected devices start resending frames to make up for the loss. These kinds of problems are overwhelming the network as a whole. This generates even more traffic, making the congestion even worse. Analyze which of the following policies HomeLand should adopt to detect congestion on the network after experiencing several missed acknowledgment messages

Implicit signaling

As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water?

Install cable through conduits.

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

Insufficient wireless coverage

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error

Interference seems to be the cause.

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud?

Internet

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be

It will increase the possibility of transmission interference between wires

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here

Jitter

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?

Knowledge Base

Josh is a new trainee at TT&P who has been sent to a client location to patch up cables connecting the switch to the data center. While doing so, Josh is unable to decide which connector to consider while connecting the ferrules of an SMF cable that measures 1.25 mm. Analyze and suggest which of the following connectors Josh should opt for under the circumstances so that there are minimum back reflections

LC

To ensure better security measures for the computers used in your organization, you, as a network administrator, have decided to update the passwords of each computer on a weekly basis. But managing and changing the passwords for all the computers is a tiresome task. Hence, you decide to apply a security measure with the help of a password management software. Which of the following software will you use in this scenario?

LastPAss

Bradley has been running a business in his garage for over a period of 10 years. He plans on expanding the business by opening up three new offices in three different cities. Since he has accumulated sufficient profits to move to a larger office space, he plans to upgrade his network connection to one with a dedicated and symmetrical bandwidth. Bradley approaches Mantle Solutions, an ISP. Which of the following options should be offered by the ISP in this scenario?

Leased lines

Huey Dewey Ltd. is a talent management company with over a hundred employees. Gary has been appointed as a system analyst to ensure security across the office networks during and after the period of employment. Some user accounts are given privileged access, which allows the users to perform more sensitive tasks, such as viewing or changing financial information, making configuration changes, or adjusting access privileges for other users. Analyze which of the following security precautions Gary should implement so that he can avoid users logging into the accounts even after their termination

Limited duration

Which of the following is not a characteristic of fiber-optic cables?

Low cost

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this

Low overhead, fast convergence

An authorization method grants access to a user when the user's classification and category match those of a resource?

MAC

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination

MAC address

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

The organization where you have been working as a network analyst decides to provide BYOD (bring your own device) options to the employees to cut down on its operating costs. The company has asked you to handle the BYOD policies and the necessary documentation. You have decided to install a software that will automatically handle the configuration process for the wireless clients when they require network access. Which of the following will you use in such a scenario?

MDM

You are a network administrator, and you want to verify that a cable is properly conducting electricity so that its signal can travel unimpeded from one node on a network to another. Which of the following tools would you use to identify this while setting up the network segment?

Multimeter

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets

MIL Ltd. can create up to 65,536 subnets.

Identify which of the following designations can be associated with a member who coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation?

Manager

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable?

Media converter

Which testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

Metasploit

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

Which of the following protocols is used to synchronize clocks on computers throughout a network?

NTP

You, as a network engineer, want to have an insight into your network's weaknesses that need attention. You want to search for devices with open ports indicating which insecure service might be used to craft an attack and identify unencrypted sensitive data. Which of the following scanning tools will you use in this scenario?

Nessus

Which of the following is used to create flow records that show relationships among various traffic types?

NetFlow

Larry is a senior technician who has to document the recent troubleshoot he carried out at Kroger Industries related to the baseline configuration of network devices. Larry is still unsure as to what category type he should document the troubleshoot so that it falls under standard operating procedures. Analyze which of the following category types Larry should opt for in such a scenario

Network configuration

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error

Network layer

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

Network layer

Which of the following monitors network traffic and might receive data from monitored devices that are configured to report their statistics?

Network monitor

You are working as a network administrator, and you want to conduct simulated attacks on a network to determine its weaknesses. To do so, you want to check for open ports so that you can remote in using that port and craft an attack. Which of the following software will you use to scan for open ports in this scenario?

Nmap

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?

OFDMA

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation

Order switches that allow upgradeable interfaces

Britain Airways has complained of a faulty NIC as a result of which they are having connectivity issues within the organization. You, as a senior technician, want to find out the manufacturer of the NIC so that you can submit a report of constant bugs in their device. Which of the following addresses will help you to identify the manufacturer of the NIC?

Organizationally Unique Identifier

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs

Out-of-band management

You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation?

PAM

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

PEAP

As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?

Padding

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

Patch Cable

What is the data passed between utility programs or applications and the operating system known as?

Payload

Which of the following cables comes coated with a flame-resistant jacket?

Plenum cable

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

Port 3389

Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

Port mirroring

Analyze which of the following is true about a default VLAN

Ports in default VLAN can be reassigned to other VLANs.

Which of the following cloud models makes resources available to users through a WAN connection?

Private Cloud

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won't receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario?

Proxy server

You are a network technician who, on inspection, has found that one of the cables is faulty as a result of which you now have to insert a new piece of twisted pair into the data receptors to complete the circuit. Which of the following will you apply to sort this issue?

Punchdown tool

Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?

QoS

At a security training exercise, you had to devise a strategy to penetrate into an organization's data room by accessing one of their employee's ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?

Quid pro quo

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

RADIUS

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.

Roll out changes in stages.

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

RDP

You are working as a technical specialist for an ISP. The network administrator has asked you to set up a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use?

RIPv2

Which of the following protocols can detect and correct link failures in milliseconds?

RSTP

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as?

Rollback

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

Resolvers

Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?

Retransmission policy

You have been hired to implement a major change in the financial software used by the accountants at a fast-food chain. On implementation, you notice that the devices are not compatible with the upgrade and have started showing errors, as a result of which the organization is unable to function. What would you do in such a situation?

Rollback

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer?

Rollover cable

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue

Router

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

Router

What is an Ethernet packet that is smaller than 64 bytes called?

Runt

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?

SAID

Which of the following consists of high capacity data storage devices in a distinctly defined network segment?

SAN

An ISP's headquarters is located in Philadelphia, and it has a branch office in Canada. The ISP wants to ship an edge device to the branch location where a non-technical person can plug in the device without any configuration needed on-site. Which of the following should be used in this scenario?

SD-WAN

Which of the following will you use to monitor and analyze data stored in logs?

SEIM

Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?

SQLnet

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?

SYN

Identify the current name of a DMZ (demilitarized zone).

Screened Subnet

Which of the following is a device or an application that stores or generates information known only to its authorized user?

Security token

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Sequence Control

Which of the following anti-malware software will slow down your network performance considerably?

Server-Based

As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context

Set a limit on consecutive login attempts

You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network?

Simplex

Which of the following will help you determine an AP arrangement that will ensure reliable wireless connectivity?

Site survey

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

Site survey

Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?

Smart thermostat

Sphinx Infra Ltd. has doubts on how to meet the various privacy, security, and safety precautions installed for their network. You have been hired to analyze the existing modules for which you will need to go through the network documentation before suggesting any change. Which segment in the network document will contain the necessary information you require?

Special instructions

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

Spectrum analyzer

Which of the following server racks would you use for a bolt-free mounting?

Square-hole racks

Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections?

Stateless firewall

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

Static VLAN assignment

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario?

Switch spoofing

Which of the following can capture all traffic traversing a network connection?

TAP

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots?

TDM

As a network analyst, you have to separate the digital communication of data in a GSM network. Which of the following will you use in this scenario?

TDMA

The IT department at Zatar Airways has complained of a faulty fiber-optic cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected?

TDR

Which of the following protocols is not a terminal emulation protocol?

TFTP

Which of the following protocols transfers files without any authentication or security?

TFTP

Which of the following is used to issue tickets to an authenticated client for access to services on the network?

TGS

Which of the following is a multipath link-state protocol?

TRILL

Which of the following remote access methods allows a remote client to take over and command a host computer?

Terminal emulation

Which of the following is the third step in a network troubleshooting methodology?

Test your theory to determine the cause

The part which identifies the network in an IPv4 address is known as

The Network ID

Tim has been contracted to install a wireless connection at the head office of Travis Roadways. The head office is located in between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI (received signal strength indicator) level required for Tim to establish the connection functional as per the requirements

The RSSI level should at least be -50 dBm

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

The default VLAN should not be used

Hill Corporation Ltd., an Internet service provider, has been providing networking solutions to Riverdale High School for over a year. However, recently the administration at Riverdale high School has been complaining of an unstable connection. You are employed by Hill Corporation for the purpose of inspecting the issue at hand. What would be your first check point to ensure that there are no network issues from the service provider's end?

The entrance facility

You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature?

The management plane

In the formula 2 ^n -2, what does n represent?

The number of bits switched from the host address to the network ID.

You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books?

The total number of computers functioning in the organization

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model?

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce

You are a network administrator at Yosaka & Associates, a private law firm. The employees have been facing various types of data errors and other transmission problems, leading to decreased productivity. You need to find an appropriate technique that will help identify locations of network bottlenecks. Which of the following techniques would you choose in such a scenario?

Traffic analysis

Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario

Traffic policing

Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath?

UTP

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection?

Untagged frames

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?

Use a top-to-bottom OSI layers approach

Johnathan is the network engineer of an organization that restricts the use of certain webpages. As he does not have any pending work, he decides to take a break and watch a movie online until a task is assigned to him. Analyze which of the following actions is best suited for him in this situation so that the IP address of the organization is not compromised

Use proxy servers to mask Internet activities

Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue?

Use tracert to target a node instead of the router

Nathan has plans of opening a call center. He will require a network connection that will have a bare minimum of 3 Gbps upstream and at least 8 Gbps downstream throughput. Analyze which of the following will provide a solution to Nathan

Using a DOCSIS 4.0 for maximum throughput

You, as a network administrator, plan on running a trial for a beta version of an application. The idea is to install the application on a guest machine. You plan on doing this because you would rather have the untested software cause errors on the guest machine than on the host. Which of the following will you use in this instance?

VirtualBox

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Which term identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Which of the following multiplexing technologies would you use with fiber-optic cable?

WDM

Which of the following threats is an interception of network keys communicated between clients and access points?

WPA Attack

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

WPS attack

Identify and analyze whether the implicit deny rule be applied to the following statements or not

When the incoming packet is denied in the third test by the ACL

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

Wi-Fi Analyzer

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

Wi-Fi analyzer

Which of the following transceivers supports up to 10 Gbps?

XFP

A distinct network of storage devices that communicate directly with each other and with other portions of the network?

a SAN

When a router connects to a switch that supports multiple VLANs, it is sometimes called

a router-on-a-stick

Which of the following commands is used to assign a statement to an ACL on Cisco routers?

access-list

As a network analyst, you want the ACL (access control list) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. Which of the following commands will you use in this scenario?

access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?

apt-get install dnsutils

BNB Group of Institutions has been facing a lot of issues with its network ever since it decided to adopt online classes as a medium to impart education. The IT department analyzes the issue and is of the opinion that the problems are related to the high amount of traffic due to students trying to log in from various locations

as a result, the network devices are overloaded. The IT department has requested your help as a network administrator. Which of the following bandwidth management techniques will you suggest in this scenario?; Flow control

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____

classless addressing

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario

layer 4 switches

Which of the following commands can be used to change a device's name?

hostname

Which of the following hostname commands resolves a device's hostname with its IP address on the network?

hostname -l

Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home

however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?; Terminal emulation

As a network administrator, a client has approached you to set up the network for MKV, a software company. The company requires sufficient amounts of data for both uploading and downloading purposes

however, it prefers a connection that has better download speed. Which of the following DSL varieties do you think is best suited for such a requirement?; VDSL

You have been assigned the role of a network administrator, and your first task requires you to measure the throughput between network hosts. Which of the following tools will you use in this scenario?

iPerf

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?

iSCSI

What command displays the full list of available objects and commands?

ip help

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

ipconfig

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC

netstat

Which of the following utilities would you use to display TCP/IP components and connections on a host?

netstat

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful

ping 8.8.8.8

Riverview Union High has contacted you to establish a secure communication over the computer network by encrypting the communication protocol using the SSL. Which of the following registered ports will you use to secure the connection?

port 443

You are working as a network engineer at Krofter Securities. The organization uses Cisco's Linux OS in all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario?

route

Which of the following commands lists a router's routing table information?

show ip route

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action?

shutdown

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

site survey

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?

sudo hostname

Which of the following is known as a packet sniffer?

tcpdump

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements.

.biz

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards?

100 Mbps (Fast Ethernet)

Mr. Anderson had to set up an Ethernet network segment that can transmit data at a bandwidth of 1000 Mbps and cover a distance of 2000 m per segment. The available fiber-optic cable in the market was an SMF cable. Analyze and discuss which of the following fiber Ethernet standards he should follow under such circumstances.

1000BASE-LX

Which of the following addresses can be identified as an APIPA address?

169.254.0.1

What is the frequency range for Bluetooth communication?

2.4 GHz-2.4835 GHz

Which of the following terms is also referred to as a "network of networks"?

Backbone

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand?

Backbone Cabling

Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time?

Bandwidth

Which of the following is an enclosed space that holds network equipment?

Data Room

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Fading

You are working as a network administrator for an ISP. You receive a complaint about fluctuations in the network speed despite using a fiber-optic cable. On checking the situation, you are of the opinion that you will need to cut a clean slice through the fiber strands. Which of the following kits should you carry for this purpose?

Fiber cleaver

Hari has been employed by Telnet Softtech Ltd. as a senior network engineer. Analyze which of the following statements he should keep in mind while visiting the data room of a multinational company for monitoring and security purposes.

He should have the HVAC sensors connected as network devices themselves.

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation?

He should use POP3 to deliver the message.

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network?

ICMP

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing?

Incorrect DNS

Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?

MDF

Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver's end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client's device's RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario.

Mark the rating as not good

Which of the following DBMS applications would you use if you were to organize data into tables and records?

Microsoft SQL Server

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

Multicast address

Which of the following tools measures the amount of light power transmitted on a fiber-optic line?

OPM (optical performance monitoring)

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario?

Plenum-rated cable

Riverview Union High has contacted you to establish a secure communication over the computer network by encrypting the communication protocol using the SSL. Which of the following registered ports will you use to secure the connection?

Port 443

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

Presentation layer

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

RDP

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case?

SSH

Which of the following is a collection of protocols that performs both authentication and encryption?

SSH

What are larger data rooms also known as?

Telecommunications room

Which of the following is the third step in a network troubleshooting methodology?

Test your theory to determine the cause.

As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?

The implementation phase

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?

The third bit

What is help desk software used for?

To document problems and their resolutions

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network?

UDP

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?

UDP

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Unicast address

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

VPN

What should be the ideal procedure after implementing the solution to a network troubleshooting problem?

Verify functionality and implement preventive measures.

Which of the following security threats involves an interception of the network keys communicated between clients and access points?

WPA attack

Which of the following client-server applications use Apache and Nginx?

Web service

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

Well-known ports

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

Wireless range extender

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

checksum

JHS Mediaworks has contacted you to troubleshoot some TCP/IP errors on some workstations within the organization. On inspection, you get to know that the workstations functioning on Windows are all stable and the ones running on UNIX and Linux systems are the ones that need troubleshooting. Which of the following command-line tools will you use in such a scenario to view and manage the TCP/IP settings?

ip

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC.

netstat

Which of the following utilities is also known as a packet sniffer?

tcpdump

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

the Network Layer


Set pelajaran terkait

Investment analysis exam 1: ch 1-2 short answer problems

View Set

Chapter 18: Human Resource Management: Small Business Considerations

View Set

BA 232 Business Management Chapter 9

View Set

Nitrogen containing Organic compounds

View Set