UDEMY QUESTIONS 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan and concurrently upload large images of items to a centralized server. Which of the following technologies should they utilize to meet these requirements?

802.11ac Explanation OBJ-1.6: 802.11ac is a very fast high-speed Wi-Fi network capable of 1 Gbps speeds over a 5 GHz spectrum - perfect for uploading large image files quickly. Additionally, the warehouse might want to also utilize RFID to allow for the accurate scanning of items using radio frequency tracking tags.

The company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation to accommodate each department's needs. What is the correct CIDR notation for the Human Resources (HR) department's subnet, which requires 25 devices?

/27 Explanation OBJ-1.4: Since the HR department needs 25 devices plus a network ID and broadcast IP, it will require 27 IP addresses. The smallest subnet that can fit 27 IPs is a /27 (32 IPs).

A network technician must replace a network interface card on a server. The server currently uses a multimode fiber to uplink a fiber switch. Which of the following types of NICs should the technician install on the server?

10GBASE-SR Explanation OBJ-5.3: 10GBase-SR is a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short-wavelength signaling. Remember, for the exam, "S is not single," meaning the ones that have a Base-S as part of its name designates it as a multimode fiber cable.

A wireless technician wants to configure a wireless network to identify itself to visitors by including the word "Guest" in the name. This wireless network needs to provide coverage to the entire building and requires 3 wireless access points to accomplish this coverage level. What would allow users to identify the wireless network by its displayed name as a single network?

ESSID broadcast Explanation OBJ-5.4: With an ESSID (Extended Service Set), a wireless network can utilize multiple wireless access points (WAPs) to broadcast a single network name for access by the clients. A BSSID (Basic Service Set) can only utilize a single WAP in each wireless network.

A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly, and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform first?

Gather information Explanation OBJ-5.1: In order to have a good understanding and a clear idea of what the issue could be, the technician should gather information as the first step.

Which of the following cloud infrastructures includes on-premise servers utilizing a centralized Syslog server hosted at a third-party organization to review the logs?

Hybrid Explanation OBJ-1.7: On-premise servers is an aspect of the private cloud, whereas Syslog hosted on a third-party server is an aspect of the public cloud. Since a hybrid cloud consists of any type of cloud computing sharing multiple aspects of different cloud infrastructure designs, hybrid is the correct answer.

A client has asked you to provide their local office with the BEST solution for a wireless network based on their requirements. The client has stated that their users will need a wireless network that provides a maximum of 54 Mbps of bandwidth and operates in the 2.4Ghz frequency band. Which of the following wireless network types should you install to meet their needs?

802.11g Explanation OBJ-1.6: 802.11g provides transmission over short distances at up to 54 Mbps in the 2.4 GHz band. It is backward compatible with 802.11b (which only operates at 11 Mbps). While an 802.11ac network would be the faster solution, it does not operate in the 2.4 Ghz frequency band. 802.11a operates in the 5 GHz frequency band at up to 54 Mbps.

A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all the computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost-effective manner. What devices would be MOST appropriate?

A router should be used as a gateway device, with RIPv2 as the routing protocol. The computer should be connected with a Gigabit layer 2 switch. Explanation OBJ-4.6: A Gigabit Layer 2 switch is the cheapest switching solution offering 1 Gbps network connectivity between the computers. RIPv2 has a lower overhead as outlined in the requirements.

You run the command IPCONFIG on your laptop and see that you have been assigned an IP address of 169.254.0.1. Which category of IPv4 address is this?

APIPA Explanation OBJ-1.4: APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client if the DHCP server is unavailable.

A network technician has designed a network consisting of an external Internet connection, a DMZ, an internal private network, and an administrative network. From which network segment should all routers and switches be configured to accept SSH connections?

Administrative network allowing only admin access. Explanation OBJ-4.5: Since the admin network is hidden behind firewalls (surrounding the DMZ), SSH connections from the admin network are inherently secure and therefore should be allowed to communicate with the other three networks.

Your company wants to create highly-available data centers. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?

BGP Explanation OBJ-1.3: If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available. Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol.

Your company has been asked by a local charity that supports underprivileged youth if they would help to build an internet café for their students. Because the charity doesn't have any funding for this project, your company has decided to donate their old workstations and networking equipment to create the network. All of the workstations, routers, and switches have been tested before installation. The company has decided to reuse some old network cables to connect the computers to the switches to save money. When you arrive at the new internet cafe, you are told that everything is working except unlucky computer #13 can't connect to the network. You attempt to plug the network cable into another computer, but then that computer cannot connect to the network. Confused, you try connecting the cable directly between two computers, and now they can communicate directly with each other. What is wrong with this cable?

The cable is a crossover cable but should be a straight-through cable. Explanation OBJ-5.3: Since the cable only worked when connecting two computers directly together, it is a crossover cable. Crossover cables are used to connect two of the same devices (computer to computer, or router to router) by switching the transmit and receiving pins in the cable's jack. Since you are trying to connect a computer to a switch, you need to have a straight-through cable instead.

Max is a network technician who just terminated the ends on a new copper cable used between two legacy switches. When he connects the two switches using the cable, they fail to establish a connection. What is MOST likely the issue?

The cable is a straight-through cable. Explanation OBJ-2.1: There are two types of cable, Straight-through and Crossover. In this instance, a crossover cable would need to be used to communicate with legacy switches since they won't support MDIX.

What type of cable would you use to connect a router to a switch?

straight through

What is true concerning jumbo frame?

they are commonly used on a SAN Explanation OBJ-2.4: Jumbo frames are Ethernet frames whose MTU is greater than 1500. To increase performance, you should use jumbo frames only when you have a dedicated network or VLAN, and you can configure an MTU of 9000 on all equipment. Because of this, jumbo frames are most commonly used in a separate SAN (storage area network).

Which of the following technologies allows two or more links to pass network traffic as if they were one physical link?

LACP Explanation OBJ-1.3: The Link Aggregation Control Protocol (LACP) enables you to assign multiple physical links to a logical interface that will appear as a single link to a route processor.

You are setting up uplink ports for multiple switches to communicate with one another. All of the VLANs should communicate from the designated server switch. Which of the following should be set on the uplink ports if VLAN 1 is not the management VLAN?

STP Explanation OBJ-1.3: The Spanning Tree Protocol (STP) is a network protocol used to eliminate bridge loops in Ethernet LANs. STP prevents network loops and associated network outages by blocking redundant links or paths. The redundant paths can be used to keep the network operational if the primary link fails.

After a recent breach, the security technician decides to analyze and aggregate its security logs. Which system should be used?

Siem Explanation OBJ-3.3: Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated. SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM).

Dion Training is considering moving its headquarters and data center to Florida, but they are worried about hurricanes disrupting their business operations. To mitigate this risk, Dion Training has signed a contract with a vendor located in a different state to provide hardware, software, and the procedures necessary for the company to recover quickly in the case of a catastrophic event, like a hurricane causing a power loss for up to 10 days. As the owner, Jason is a little concerned that this contract isn't sufficient to mitigate enough of the risk since it only provides a solution for the first 10 days. Jason wonders, "what will we do if a major outage occurs, and our offices are not able to be used for 6-12 months?" Jason has hired you to help develop Dion Training's long-term strategy for recovering from such an event. What type of plan should you create?

Business continuity plan Explanation OBJ-3.2: A business continuity plan (BCP) is a plan to help ensure that business processes can continue during a time of emergency or disaster. Such emergencies or disasters might include a fire or any other case where business cannot occur under normal conditions. A disaster recovery plan is useful (and usually a piece of the large business continuity plan), but it is insufficient for the long-term strategy which is needed to support business operations during an extended outage.

A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve this, which protocol should the administrator use?

LACP Explanation OBJ-3.2: The Link Aggregation Control Protocol (LACP) provides a method to control the bonding of several physical ports to form a single logical channel. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. The Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.

As part of unified communications services, QoS must be implemented to provide support for DSCP and CoS. Which of the following OSI layers does QoS operate within?

Layer 2 Explanation OBJ-1.2: DSCP is a layer 3 packet, and it is the most commonly used value for QoS of an IP packet (as it gives lots of flexibility). CoS, on the other hand, is a layer 2 packet. Based on the options given, only Layer 2 is correct

A user is receiving certificate errors in other languages within their web browser when accessing your company's website. Which of the following is the MOST likely cause of this issue?

Man-in-the- middle Explanation OBJ-4.4: A man-in-the-middle attack is a general term when a perpetrator positions himself in a conversation between a user and an application, either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is occurring. For example, if your user and server are both in the United States (English language), the attacker performing the MITM is from Russia. The user may see a certificate error in Russian instead of English.

You are troubleshooting a SQL server on the network. It has been unable to perform an uncompressed backup of the database because it needs several terabytes of disk space available. Which of the following devices should you install to have the MOST cost-efficient backup solution?

NAS Explanation OBJ-3.2: A NAS is a Network Attached Storage device, typically a bunch of cheap hard disks and usually arranged in a RAID consisting of either SAS (serial attached SCSI) or SATA disks just like the ones in most desktops.

Dion Training wants to purchase an email marketing solution to better communicate with their students. A promising new startup has a new offering to provide access to their product from a central location rather than requiring Dion Training to host the product on their internal network. Dion Training wants to ensure that their sensitive corporate information is not accessible by any startup's other clients. Which type of cloud server should Dion Training look to purchase to meet these NEEDS?

Private SaaS Explanation OBJ-1.7: SaaS (Software as a Service) is a cloud model whereby a service provider provides a software service and makes the service available to customers over the Internet. Examples of Saas include Microsoft Office 365, Microsoft Exchange Online, and Google Docs. Because of the concerns with sensitive corporate information being processed by the SaaS, Dion Training should ensure a Private SaaS is chosen. A private cloud is a particular model of cloud computing that involves a distinct and secure cloud-based environment in which only the specified client (Dion Training in this case) can operate.

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. There will be one fiber connector for the Tx port and another connector for the Rx port. Which of the following is the MOST common connector used on the switch to connect the media converter?

ST A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. There will be one fiber connector for the Tx port and another connector for the Rx port. Which of the following is the MOST common connector used on the switch to connect the media converter?

An administrator has configured a new 100Mbps WAN circuit, but speed testing shows poor performance when downloading large files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the router interface and sees the following: Router01# show interface eth1/1GigabitEthernet1/1 is up, line is upHardware is GigabitEthernet, address is FF12.CDEA.1426 Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdxMember of L2 VLAN 1, port is untagged, port state is forwarding Which of the following is the best solution to resolve this issue?

Remove DEFAULT 802.1q tag and set to server VLAN Explanation OBJ-5.3: Since the VLAN port is untagged, it can be slowing down performance. It is recommended to remove the default VLAN tag and set up a server VLAN to increase performance.

You have just replaced a faulty Ethernet cable in a patch panel. Within a few minutes, you find out that users are experiencing slow or no Internet connectivity all over the building. A broadcast storm has begun to occur. After removing the replacement cable, which of the following should you do NEXT?

Review labeling and logical network diagrams documentation. Explanation OBJ-3.1: You most likely have plugged the new cable into the wrong port on the patch panel. By reviewing the documentation and labeling, you might see the domain architecture, the strength of user connections, and the relationships in those connections, thereby making it easy to reassign the patch cables corrected. Something has likely been mislabeled, and the replacement of the patch cable was plugged into the wrong port and caused a loop.

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

WPA personal Explanation OBJ-4.3: Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice. If WPA2 Personal were an option, it would be more secure, though. WPA2 Enterprise is incorrect since the requirement was for a PSK, whereas WPA2 Enterprise requires a RADIUS authentication server to be used.


Set pelajaran terkait

Life Insurance Settlement Options

View Set

Discovering Nutrition Chapter 7: Vitamins

View Set

21: country rock and southern rock

View Set

NURS 126 Practice Assessment B 2023

View Set

Concepts of emergency and disaster preparedness

View Set

Simplifying Algebraic Expressions

View Set