Alexa_Week25

Ace your homework & exams now with Quizwiz!

Which of the following NAT implementations maps a single private IP address to a single public IP address on the NAT router? A) Many-to-one NAT B) Static NAT C) IP masquerade D) Dynamic NAT

B) Static NAT

Which of the following is a method that allows you to connect a private network to the internet without obtaining registered addresses for every host? A) OSPF B) EIGRP C) NAT D) BGP

C) NAT

You have only one physical interface but want to connect two IP networks. Which of the following would allow you to do so? A) The sticky feature B) A loopback address C) Virtual IPs D) Subinterfaces

D) Subinterfaces

Which of the following BEST defines a SAN? A) A block-level storage network B) A Core layer switch C) A top-of-rack switch D) A mid-tier speed switch

A) A block-level storage network

Which of the following do hosts on a private network share if the network utilizes a NAT router? A) A physical IP address B) A virtual IP address C) A virtual MAC address D) A physical MAC address

A) A physical IP address

Which of the following BEST describes an ARP spoofing attack? A) An attack that associates an attacker's MAC address with the IP address of a victim's device. An attack where a frame is manipulated to contain two tags. An attack that changes the source MAC address on frames. An attack in which a switch is flooded with packets, each containing a different source MAC address.

A) An attack that associates an attacker's MAC address with the IP address of a victim's device.

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do? A) Configure port security on the switch. B) Remove the hub and place each library computer on its own access port. C) Create static MAC addresses for each computer and associate each address with a VLAN. D) Create a VLAN for each group of four computers.

A) Configure port security on the switch.

Within an SDN, what is commonly referred to as the brains? A) Controllers B) Initiators C) Fabric D) Hosts

A) Controllers

Which device is NAT typically implemented on? A) Default gateway router B) ISP router C) RADIUS server D) AD server

A) Default gateway router

Which of the following is true about Network Address Translation? A) It supports up to 5,000 concurrent connections. B) It provides end-device to end-device traceability. C) It cannot forward DNS requests to the internet. D) It allows external hosts to initiate communication with internal hosts.

A) It supports up to 5,000 concurrent connections.

You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used? A) NAS with clustering B) Fibre Channel SAN C) iSCSI SAN with clustering D) NAS

A) NAS with clustering

Which of the following has the least default administrative distance? A) Static route to an IP address B) RIP C) OSPF D) External BGP

A) Static route to an IP address

Which of the following switch attacks bypasses the normal functions of a router to communicate between VLANs and gain unauthorized access to traffic on another VLAN? A) Switch spoofing B) MAC spoofing C) Dynamic Trunking Protocol attack D) ARP spoofing

A) Switch spoofing

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? A) Wait for convergence to take place. B) Force RIP to perform an immediate update. C) Manually reconfigure the default route to point to the new next hop router. D) Stop and restart the RIP protocol on the router.

A) Wait for convergence to take place.

Which of the following utilities would you use to view the routing table? A) route B) tracert C) mtr D) dig E) traceroute

A) route

Which of the following is NOT one of the IP address ranges defined in RFC 1918 that are commonly used behind a NAT server? A) 172.16.0.1 to 172.31.255.254 B) 169.254.0.1 to 169.254.255.254 C) 192.168.0.1 to 192.168.255.254 D) 10.0.0.1 to 10.255.255.254

B) 169.254.0.1 to 169.254.255.254

Which of the following scenarios would typically utilize 802.1x authentication? A) Authenticating remote access clients. B) Controlling access through a switch. C) Authenticating VPN users through the internet. D) Controlling access through a router.

B) Controlling access through a switch.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having issues. Which of the following configuration values would you MOST likely need to change? A) DNS server B) Default gateway C) Subnet mask D) IP address

B) Default gateway

Which of the following is a method of VLAN hopping? A) MAC spoofing B) Double tagging C) MAC flooding D) ARP spoofing

B) Double tagging

Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable? A) Interior dynamic routing protocols B) Exterior dynamic routing protocols C) Distance vector routing protocols D) Link state routing protocols

B) Exterior dynamic routing protocols

Which of the following are the components of a SAN? A) Distribution switches, targets, and SAN fabric B) Hosts, storage, and SAN fabric C) Access switches, SAN fabric, and hosts D) SAN fabric, core switches, and the initiator

B) Hosts, storage, and SAN fabric

Which of the following are true of the IS-IS routing protocol? (Select two.) A) It is best suited for small networks. B) It divides large networks into areas. C) It uses bandwidth and delay for the metric. D) It is a classful protocol. E) It supports IPv6 routing. F) A router is the boundary between one area and another.

B) It divides large networks into areas. E) It supports IPv6 routing.

What are the main differences between the OSPF and IS-IS routing protocols? A) OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. B) OSPF requires an area 0, while IS-IS does not. C) OSPF is a link state protocol, while IS-IS is not. D) OSPF is a classful protocol, while IS-IS is a classless protocol.

B) OSPF requires an area 0, while IS-IS does not.

What is the main difference between RIP and RIPv2? A) RIP use hop count for the metric, while RIPv2 uses a relative link cost. B) RIP is a classful protocol, while RIPv2 is a classless protocol. C) RIP is a distance vector protocol, while RIPv2 is a link state protocol. D) RIP has a limit of 15 hops, while RIPv2 increases the hop count limit.

B) RIP is a classful protocol, while RIPv2 is a classless protocol.

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these servers? A) Restricted B) Static C) Overloading D) Dynamic

B) Static

Which of the following can cause broadcast storms? A) Routing loops B) Switching loops C) Duplicate IP addresses D) Duplicate MAC addresses

B) Switching loops

A workstation's network board is currently configured as follows: Network Speed = Auto Duplexing = Auto The workstation is experiencing poor network performance, and you suspect that the network board is incorrectly detecting the network speed and duplex settings. Upon investigation, you find that it's running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the switch port configuration for the connected workstation. Given that it's a Cisco switch, which commands can you use on the switch to show a list of all switch ports and their current settings? (Select two.) A) show interface ethernet counters B) show interface C) show interface switchport D) show interface capabilities E) show running-config interface

B) show interface E) show running-config interface

Which of the following best describes DHCP scope exhaustion? A) When an attacker adds a second DHCP server to a network and offers IP addresses to clients wanting to join the network. B) When a DHCP snooping technique is used to drop packets from untrusted DHCP servers. C) A denial of service from a lack of IP addresses in a DHCP server's pool. D) When IP address lease times on a DHCP server are shortened.

C) A denial of service from a lack of IP addresses in a DHCP server's pool.

What are the three layers of an SDN? A) SaaS, IaaS, and PaaS B) Software, Management, and Construction C) Application, Control, and Infrastructure D) Physical, Control, and Virtualized

C) Application, Control, and Infrastructure

Which of the following allows incoming traffic addressed to a specific port to move through the firewall and be transparently forwarded to a specific host on the private network? A) IP masquerade B) Dynamic NAT C) DNAT D) OSPF

C) DNAT

An attacker hides his computer's identity by impersonating another device on a network. Which of the following attacks did the attacker MOST likely perform? A) DTP attack B) VLAN hopping attack C) MAC spoofing attack D) ARP spoofing attack

C) MAC spoofing attack

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network? A) Zero B) One C) Two D) Four E) Five

C) Two

Listen to exam instructions Kate, a network administrator, has been tasked with staying within the company budget. She has a large network and doesn't want to spend more than she needs to on purchasing and registering multiple public IP addresses for each of the hosts on her network. Which of the following methods could help her provide internet access but also keep costs low and limit the number of registered IP addresses her organization needs to purchase? A) Use Layer 3 switches. B) Use PoE devices. C) Use Network Address Translation. D) Use Layer 2 switches.

C) Use Network Address Translation.

Which of the following routing protocols is a hybrid that uses a composite number for its metric based on bandwidth and delay? A) RIP B) BGP C) OSPF D) EIGRP

D) EIGRP

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of these broadcast storms? A) Manually set the speed for each switch port. B) Disable auto-duplex detection. C) Configure each switch with a single trunk port. D) Enable Spanning Tree on the switches.

D) Enable Spanning Tree on the switches.

Brett has been tasked with creating a new SAN. The company currently has Gigabit internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN. Brett tells the CTO that this will not work. Which of the following BEST describes the problem? A) Fibre Channel over Ethernet requires all new, specialized equipment. B) Fibre Channel over Ethernet is still only conceptual. C) Fibre Channel over Ethernet is slower than iSCSI. D) Fibre Channel over Ethernet requires 10 Gigabit internet.

D) Fibre Channel over Ethernet requires 10 Gigabit internet.

What BEST describes the designed purpose of InfiniBand? A) Unlimited 10 Gigabit internet B) Jumbo frames C) Cloud platforms D) High-performance supercomputers

D) High-performance supercomputers

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers? A) If the network is connected to the internet using public addressing. B) If the network has over 15 areas and uses IPv6. C) If the network has over 15 hops. D) If the network is connected to the internet using multiple ISPs.

D) If the network is connected to the internet using multiple ISPs.

Which option BEST describes the third layer in the SDN architecture? A) Management B) Application C) Contol D) Infrastructure

D) Infrastructure

Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN. A) Using Fiber optic cables, connect each server B) Deploy two FC switches C) Deploy the shared storage devices D) Install E) Using fiber optic cables, connect each storage device

D) Install B) Deploy two FC switches A) Using Fiber optic cables, connect each server C) Deploy the shared storage devices E) Using fiber optic cables, connect each storage device

Which of the following BEST describes dynamic routing? A) Routing is done between autonomous systems. B) Routing entries are manually added to routing tables. C) Routing is done within an autonomous system. D) Routers learn about networks by sharing routing information with each other.

D) Routers learn about networks by sharing routing information with each other.

You are unsure if the gateway address is correct for one of your subnetworks because traffic is not leaving the network. Which of the following tables could you look at to check if the gateway address is correct? A) MAC address table B) ARP table C) State table D) Routing table

D) Routing table

In which of the following tables does a NAT router store port numbers and their associated private IP addresses? A) ARP table B) Routing table C) MAC address table D) Translation table

D) Translation table

Which of the following scenarios would cause a problem in asymmetric routing? A) Using a hub in the traffic flow. B) Using two routers in the traffic flow. C) Using two switches in the traffic flow. D) Using two stateful firewalls in the traffic flow.

D) Using two stateful firewalls in the traffic flow.

Listen to exam instructions You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? A) Port security B) VPN C) Spanning Tree D) VLAN

D) VLAN

Which of the following attacks manipulates a switch's auto-negotiation setting to access a virtual local area network that's connected to the same switch as the attacker's virtual local area network? A) MAC spoofing B) ARP spoofing C) Dynamic Trunking Protocol attack D) VLAN spoofing

D) VLAN spoofing

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use? A) iSCSI option under File and Storage Services in B) Server Manager C) Internet Storage Name Service D) iSCSI Initiator E) Multipath I/O

D) iSCSI Initiator

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge? A) Remove link cable 6 from the configuration. B) Remove link cables 1 and 6 from the configuration. C) Remove link cable 1 from the configuration. D) Configure a priority number of 61440 for switch C. E) Configure a priority number of 4096 for switch C.

E) Configure a priority number of 4096 for switch C.

Drag each description on the left to the appropriate switch attack type on the right. ARP spoofing/poisoning Dynamic Trunking Protocol MAC flooding MAC spoofing A) Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. B) The source device sends frames to the attacker's MAC address instead of to the correct device. C) Can be used to hide the identity of the attacker's computer or impersonate another device on the network. D) Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network.

The source device sends frames to the attacker's MAC address instead of to the correct device. Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network. Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. Can be used to hide the identity of the attacker's computer or impersonate another device on the network.


Related study sets

Accounting Data Analytics Exam 2 (Ch 5-9)

View Set

Architects + Engineers around 1900

View Set

Adam's Humanities Quote Recognition Entire Year

View Set

Nursing: Health assessment & Promotion: Chapter 23: Male Genitalia and Rectum

View Set

ENVS 361 - Sustainable development

View Set

Lesson 16: Connecting to a Network

View Set

Business Research Methods - Exam 2

View Set

CHAPTER 29 Growth and Development of the Adolescent (11-20 years)

View Set