Module 4 Quiz

Ace your homework & exams now with Quizwiz!

Finn needs to create multiple virtual networks using a /28 mask. How many devices can he put on each subnet? a. 16 b. 14 c. 30 d. 32

b. 14

Raven has been asked to configure the web server with a specific public class B IP address. Which of the following is a possible address she was given? a. 168.192.10.172 b. 192.165.10.172 c. 172.16.172.16 d. 127.192.168.172

a. 168.192.10.172

Beth has been asked to migrate the company's virtual private clouds from class C private addresses to class B private addresses. Which of the following is a valid address for her to change the web server's IP address to? a. 192.168.100.100 b. 172.30.101.50 c. 10.201.115.12 d. 168.192.100.5

b. 172.30.101.50

Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement? a. Different cloud service providers for each department b. An Internet gateway c. Network address translation d. Different subnets for each department

d. Different subnets for each department

Abby has just created a new virtual machine. Once it has been installed, she connects to it and finds that it has configured the default subnet mask for a class A network. Which of the following subnet masks was automatically configured for this server? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

a. 255.0.0.0

Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic? a. CIDR b. VPN c. DDN d. VLAN

a. CIDR

Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role? a. IG b. IGMP c. IGRP d. IDS

a. IG

Hershel is working with a virtual network that has the subnet mask 255.255.255.192. He changes the IP address of one of the servers from 172.16.25.183 to 172.16.25.193. What is the result of this change? a. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a router. b. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a switch. c. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a DNS server. d. The server will still be able to communicate with the devices on the subnetwork that it was previously in without the aid of any other devices or servers.

a. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a router.

Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company? a. VPC b. VNC c. VPN d. VDI

a. VPC

Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment? a. Virtual firewall b. Internet gateway c. VNC d. Virtual switch

a. Virtual firewall

Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway? a. 10.20.30.127 b. 10.20.30.126 c. 10.20.30.254 d. 10.20.30.94

b. 10.20.30.126

Bellamy has been asked to configure the virtual router interface for the subnetwork that contains the server with IP address 172.19.101.200 and subnet mask of 255.255.255.128. He is asked to use the first usable IP address of the subnet. Which of the following IP addresses should he use? a. 172.19.101.128 b. 172.19.101.129 c. 172.19.101.192 d. 172.19.101.193

b. 172.19.101.129

Lexa has been asked for the subnet ID and subnet mask in CIDR notation for one of the web servers in the company's private cloud. The web server has an IP address of 192.168.1.200 and a subnet mask of 255.255.255.192. What should she tell them? a. 192.168.1.128/25 b. 192.168.1.192/26 c. 192.168.1.192/27 d. 192.168.1.128/26

b. 192.168.1.192/26

Dwight has just moved all of the Linux servers from the VPC that they shared with some Windows servers to another VPC. Which of the following does he most likely need to do? a. Remove the rules that allow port 53 from the firewall to the original VPC. b. Remove the rules that allow port 22 from the firewall to the original VPC. c. Remove the rules that allow port 443 from the firewall to the original VPC. d. Remove the rules that allow port 3389 from the firewall to the original VPC.

b. Remove the rules that allow port 22 from the firewall to the original VPC.

Ezekiel wants to ensure that several of the cloud resources he is responsible for managing are always available. Which of the following might best help him meet his goals of high availability? a. Offsite backup to another region b. Site mirroring between two or more regions c. Daily replication to another region d. Warm site

b. Site mirroring between two or more regions

Simon was asked to create three Linux virtual machines to host the company's new sales application and database server. He is going to be using the company's cloud service provider and was given the 10.20.30.0/30 subnet to put them on. He immediately tells the person giving him this task that he cannot do what is asked of him. Why? a. The web server needs a public IP address. b. The /30 subnet is not large enough for 3 virtual machines. c. Linux will not run as a virtual machine. d. The cloud service provider does not allow private IP addresses to be assigned to virtual machines.

b. The /30 subnet is not large enough for 3 virtual machines.

Glenn has been tasked with creating a few new virtual machines for a new project that will be used by the finance department. It will contain sensitive data about the company and its operations. Which of the following is the most important thing for Glenn to consider as he's creating the virtual machines? a. Which operating system is being used for the servers b. Which region he is creating the virtual machines in c. How much disk space is being allocated d. How much memory is being allocated for each virtual machine

b. Which region he is creating the virtual machines in

Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured? a. /8 b. /16 c. /24 d. /32

c. /24

Tara had originally created a /28 mask for the 12 servers in the sales group server pool. However, her company has just merged with a competitor and she needs to expand the subnet to accommodate another 20 servers. Which of the following new subnet masks will accommodate the new servers in addition to the original servers while having the fewest number of unused IP addresses remaining? a. /29 b. /27 c. /26 d. /25

c. /26

Rosita has configured a subnet mask of 255.255.252.0 for the new virtual private cloud she is creating for her organization. One of the junior administrators remarks that he's never seen that kind of a subnet mask before and isn't sure how many devices the subnet would hold. How many devices should Rosita tell him that it will support? a. 1,024 b. 1,021 c. 1,022 d. 1,028

c. 1,022

Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given? a. 172.168.100.10 b. 200.100.50.25 c. 192.168.205.63 d. 192.158.1.70

c. 192.168.205.63

Gabriel has been given the 10.30.0.0 network and told to use the subnet mask 255.255.248.0 for the new cloud infrastructure he is building out for the subsidiary his company just purchased. Assuming one of the IP addresses is used for a virtual router interface on that subnet, how many virtual machines could he create in each subnetwork? a. 4095 b. 1022 c. 2045 d. 3097

c. 2045

Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block? a. 255.255.255.128 b. 255.255.255.224 c. 255.255.255.240 d. 255.255.255.248

c. 255.255.255.240

Fictional Corp has just moved its web server from its on-premises data center to a cloud service provider. Which of the following most likely needs to be changed by an administrator? a. ARP entries b. Routing tables c. DNS entries d. VLAN configurations

c. DNS entries

Rick is planning a deployment of multiple virtual machines that need to have internal IP addresses. He is unsure which address ranges he can use. He knows there is a formal document that outlines the ranges that can be used for internal addresses. Which of the following options is that formalized set of specifications? a. RFC 3927 b. RFC 2131 c. RFC 1918 d. RFC 882

c. RFC 1918

Negan has been given the 10.50.0.0/16 subnet to create the cloud infrastructure necessary for a new subsidiary that his company is creating, Zombies Inc. He wants to create a minimum of 500 smaller networks that can hold 100 servers each out of that space to minimize broadcast traffic within each subnet. Which of the following CIDR masks could he use to meet his requirements? a. /22 b. /23 c. /24 d. /25 e. /26

d. /25

Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet? a. 10.20.30.30 b. 10.20.30.32 c. 10.20.30.1 d. 10.20.30.31

d. 10.20.30.31

Octavia has set up a private cloud with a virtual machine at the IP address 172.19.101.5 and the subnet mask 255.255.255.192. She has been asked what the broadcast IP address is for the network. How should she respond? a. 172.19.101.255 b. 172.19.101.127 c. 172.19.101.31 d. 172.19.101.63

d. 172.19.101.63

Clarke is trying to come up with a subnet mask so that three servers with the IP addresses 172.16.31.10, 172.16.30.15, and 172.16.31.206 are in the same network. Which of the following subnet masks will accommodate this requirement? a. 255.255.255.0 b. 255.255.255.128 c. 255.255.255.192 d. 255.255.254.0

d. 255.255.254.0

Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it and it immediately fails. Which of the following steps might she have forgotten to do? a. Configure DNS entries b. Configure the MAC address in the ARP table c. Start the RDP daemon d. Open port 22 on the virtual firewall

d. Open port 22 on the virtual firewall

Jasper was given the IP address of 10.17.101.120/15 for the virtual machine he is to create along with the default gateway of 10.0.0.1. He enters the IP address correctly along with the subnet mask 255.254.0.0. However, the virtual machine doesn't appear to be able to communicate with the Internet when he tries to ping a popular domain name. Which of the following might be the reason why? a. The subnet mask is incorrect. b. There is no route in the routing table. c. The firewall is blocking the traffic. d. The default gateway is incorrect.

d. The default gateway is incorrect.


Related study sets

Finance 300 Practice Questions Chapter 8

View Set

SAS - Machine Learning (Practice Exam)

View Set

Non Open-ended Pediatric, Powdered, Oral, By weight, Parenteral, and Injection

View Set

Psychology Exam 3 (Chapters 7,12,13)

View Set

Quiz #8: Enterprise Resource Planning

View Set

Advantages & Disadvantages of Fulfillment Centers

View Set