Domain 2.0 Percipio Network+ Practice Test

Ace your homework & exams now with Quizwiz!

After examining a fiber optic connection using specialized testing equipment, you are told that there seem to be higher than normal levels of return loss. Which type of connector may cause an increase in return loss if used?

SC UPC An SC Ultra Polished Contact (UPC) is an SC connector type whose end face, the end of the fiber optic strand that has been cut and terminated in the connector, is polished at exactly right angles to the axis of the strand. Any reflected light from the contact of the fiber optic cables is reflected directly back towards the light source. This fact may cause an increase in return loss.

In general, what kinds of speeds can be expected from modern Satellite Internet access services?

Several tens of Mbps Satellite Internet access is Internet access that is provided through communications satellites. Modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites that can offer relatively high data speeds, with newer satellites using Ka band to achieve downstream data speeds up to 50 Mbps. Satellite connections are primarily used in areas where other more conventional and almost always more cost-effective solutions are not available.

When you start your DSL modem to connect to the Internet Service Provider (ISP), which phase does PPPoE initiate?

Discovery The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames. When you start the DSL modem, the PPPoE protocol initiates the Discovery phase in which user session and remote site session learn about each other's network addresses.

You have several virtual machines running on a single host. Recently, you have detected malicious traffic between virtual machines. You want to ensure that you can detect the malicious traffic transmitted between the virtual machines. What should you do?

Install and configure Host Intrusion Prevention System (HIPS) on each virtual machine An intrusion prevention system (IPS) is a network security appliance that monitors network or system activities for malicious activity identifies this activity and logs information about it. An IPS system differs from an IDS system in that it goes one step further and attempts to block or stop the malicious actions taking place.In this scenario, since you must block the malicious traffic from being transmitting from one virtual machine to another, a HIPS would work.

You are asked to implement access lists as well Network Address Translation (NAT) on the network. On which of the following devices would you implement such changes?

Router A router is a networking device that routes data packets between computer networks. A data packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node. Routers route traffic based on the Layer 3 destination address. Other functionalities include implementation of access lists, dynamic routing protocols and Network Address Translation (NAT).

Where can you use the ATM protocol? [Choose all that apply]

- Desktop - Wide area networks inside a carriers network - Frame relay - Campus backbone Asynchronous transfer mode (ATM) is a telecommunications concept for carriage of a complete range of user traffic, including voice, data, and video signals. It was developed to meet the needs of the Broadband Integrated Services Digital Network (ISDN) and designed to unify telecommunication and computer networks. It was designed for a network that must handle both traditional high-throughput data traffic (file transfers), and real-time, low-latency content such as voice and video. It can be used with desktops, where all applications run on ATM. It can also be used as campus backbone, WAN, and insider carrier network, such as Frame relay or leased line services on ATM.

Refer to the exhibit. In which of these situations would you use a crossover cable?

A, C and D An Ethernet crossover cable is one that is wired using the TIA/EIA 568A standard on one end and the TIA/EIA 568B on the other. It doesn't matter which end is wired with which standard nor does it matter which end connects to which device. A crossover cable is used when two devices are of the same type (router to router or switch to switch). It can also be used to connect a PC directly to a router, because they both have similar components.

An Ethernet network connection between two switches using a 25-meter-long UTP cable is expected to function at a speed of 10 Gbps. However, the speed autoconfiguration feature on the switches can achieve speeds of 1 Gbps. What category of cable should you replace the UTP cable with for the link to function at 10 Gbps?

Cat 6 Category 6 cable, commonly referred to as Cat 6, is a standardized twisted pair cable for Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards. The cable standard specifies performance of up to 250 MHz and allows the cable to support 10GBASE-T speeds over up to 55-meter cable runs where its predecessors can achieve only up to 1 Gbps speeds.

You are installing a twisted pair network cabling type that supports up to 10 Gbps Ethernet connectivity. However, you are asked to replace this with an improved specification of the same type of cabling that allows for speeds of 10 Gbps for longer cable runs of up to 100 meters. Which copper cabling categories would you use for this?

Category 6 cable, commonly referred to as Cat 6, is a standardized twisted pair cable for Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards. The cable standard specifies performance of up to 250 MHz and allows the cable to support 10GBASE-T speeds over up to 55-meter cable runs. Augmented Category 6 or Cat 6a supports performance at up to 500 MHz and has improved crosstalk characteristics, allowing 10GBASE-T to be run for the same 100-meter maximum distance as all smaller Ethernet variants.

You want to implement a network that can encapsulate and carry data of various network protocols. Which of the following network should you implement?

MPLS Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks. MPLS directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links between distant nodes rather than endpoints. MPLS can encapsulate packets of various network protocols, hence its name multiprotocol.

Refer to the following statements about load balancers: 1. Combines multiple WAN connections to the Internet 2. Balances CPU load of multiple network devices for efficiency 3. Performs wireless channel bonding to increase aggregate throughput Which of the preceding statements is true?

Statement 1 A load balancer is a device that can combine or bind multiple wired WAN connections to the Internet and provide the aggregate bandwidth to an internal network. This device implements algorithms that will balance the sessions initiated by the internal network over all the available WAN connections to evenly and efficiently distribute the network traffic.

What is Fiber Channel used for?

To connect computer data storage to servers Fiber Channel, or FC, is a high-speed network technology primarily used to connect computer data storage to servers. Fiber Channel is mainly used in storage area networks (SANs) in commercial datacenters. Fiber Channel networks form a switched fabric because they operate in unison as one big switch.

You are asked to procure a single device that will provide intrusion detection, antimalware, antispam, antivirus, content filtering, VPN connectivity and network security services. Which of the following devices would you choose?

UTM appliance Unified Threat Management (UTM) is an approach to information security where a single hardware or software solution provides multiple security functions. A UTM appliance is one such device. This simplifies security management by providing a single management and reporting point for security administration instead of having multiple devices for this purpose.

Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?

VPN Concentrator A Virtual Private Network (VPN) is a type of connection that allows the establishment of secure connections between a client and a server or between two geographically disparate networks over an insecure network such as the Internet. A VPN concentrator is a device that usually resides on the enterprise network that accepts incoming VPN connection requests and acts as a central node for multiple VPN connections.

This device is used to sample sound, digitize it using techniques such as pulse code modulation (PCM), compress it using codecs such as G.711, packetize it and send it over a network to be delivered to a similar device at the other end of the communication. Which of the following devices performs these functions?

VoIP endpoint A voice over IP (VoIP) endpoint is any network end user device that has the capability of sending voice over an IP network. This includes devices such as IP phones which connect directly to the Ethernet ports of a switch, as well as voice and video clients configured on a PC or a mobile device. Most VoIP endpoints today use Session Initiation Protocol (SIP) as their control protocol.

You are asked to design a network to provide Internet access to several dozen employees in three rooms within a historically significant building. The network must be available in all areas of the rooms but requires that as little intervention into the building's structure take place as possible. Which of the following would be best to use to achieve this?

Wireless Access Point A wireless access point allows users to connect to a network wirelessly without the need for cabling for each user. The access point itself would require a single cable through which both data and power can be provided. A single access point in each room with an uplink to a central switch would suffice for the needs of the network thus minimizing the amount of cabling installed.

Refer to the following statement: This IP based storage networking standard is used to link data storage facilities over TCP/IP networks. Which of the following is being described?

iSCSI Internet Small Computer Systems Interface (iSCSI) is an IP based storage networking standard for linking data storage facilities. It provides block level access to storage devices for datacenter servers by carrying SCSI commands over a TCP/IP network. It is used to manage storage over intranets as well as over long distances.


Related study sets

Worksheet 33.1: Nature and Classification of Corporations

View Set

CC 302 Module 4 Practice and Graded Quizzes

View Set

Contract Law - Contractual Capacity

View Set

Med Surg: Chapter 17 Fluid, Electrolyte, and Acid-Base Imbalances

View Set

Sherpath Peds- Childhood Cancers

View Set

Pharmacology: Chapter 18: Vaccines and Sera

View Set