NETWORKING FINAL

Ace your homework & exams now with Quizwiz!

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

255.255.240.0

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.224

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function?

3

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

30

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z- Wave transmission to reach the devices, which will also act as repeaters?

4 hops

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput, Analyze which frequency range will help Jasmine to fix this issue

5.925 GHz - 7.125 GHz

How many bits are used in a network with a subnet of 255.0.0.0?

8

Which of the following 802.11 wireless standards has a theoretical throughput of I1 Mbps?

802.11b

Identify which of the following statements is Correct.

A 32-bit IPv4 address is organized into four groups of 8 bits each.

Which of the following manages the dynamic distribution of IP addresses to devices on a network?

A DHCP

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

ROUTER

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

Resolvers

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.

Router

Which of the following protocols is used to send an email message to the first server?

SMTP

Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?

SQLnet

Which of the following is a collection of protocols that performs both authentication and encryption?

SSH

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?

SYN

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer?

roll over cable

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87?

10.43.3.87:23

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards?

100 Mbps (Fast Ethernet)

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

14

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth, She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices, This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

2 4 GHz-2 4835 GHz

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?

25

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?

A network operating system is much more expensive than a desktop operating system.

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender?

Acknowledgment number

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers?

Active Directory

What is a small file containing verified users' identification information and public key known as?

Digital certificate

Which of the following statements stands true?

An email can be downloaded to the client computer using POP3.

Which of the following terms is also referred to as a "network of networks"?

Backbone

Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time?

Bandwidth

Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario?

Barney should use VDI (Virtual Desktop Infrastructure).

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Checksum

Which of the following ports range from 49152 to 65535 and are open for use without restriction?

Dynamic and private ports

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers?

CuteFTP

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

Departmental boundaries

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

Ethernet

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?

FTPS

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

Four bits

Mr. Haywire has just bought a set of wireless security cameras for his backyard. Howard, a network professional, has been sent by the store to set up the security cameras, While configuring and setting up the cameras, Howard notices that he is unable to configure the in-house Wi-Fi network with the cameras because of some frequency issues. Analyze what Howard should do in this situation.

He should set up an AP that offers a Wi-Fi standard on that band.

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation?

He should use POP3 to deliver the message.

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

IBSS

Which of the following institutions assigns a manufacturer's OUI?

IEEE

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?

IPsec

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages

Identification

Which of the following statements is true?

In a peer-to-peer network model, each computer controls its own administration, resources, and security.

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination.

MAC address

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit.Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees performance. It has hired JW Communications to manage and assess its network requirements, After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.

Interference seems to be the cause.

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here.

Jitter

Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload?

Layer 4

Which of the following is not a characteristic of fiber cable?

Low cost

Britain Airways has complained of a faulty NIC as a result of which they are having connectivity issues within the organization. You, as a senior technician, want to find out the manufacturer of the NIC so that you can submit a report of constant bugs in their device. Which of the following addresses will help you to identify the manufacturer of the NIC?

Organizationally Unique Identifier

As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?

Padding

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

Which of the following protocols is not a terminal emulation protocol?

TFTP

Which of the following protocols transfers files without any authentication or security?

TFTP

Which of the following layer's header identifies the IP address of the destination host?

The network Layer

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?

The third bit

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model?

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network?

UDP

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath?

UTP

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Unicast address

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

VPN

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

Well-known ports

You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

Window size

Mr. Furland was hired as a network engineer at Secret Eye Corporations that is running a security camera outlet. While setting up a camera at one of the sites, he notices that the security camera has been mounted really high as a result of which there are no power receptacles to power up the device. So, Mr. Furland plans on powering these devices using an Ethernet cable. Which category of cable should he choose to power up the device?

cat 7

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

classless addressing

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

diffraction

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage, Analyze which of the following phenomena must be used to ideally describe this scenario.

fading

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second?

giga

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

insufficient wire coverage

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

ipconfig

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running?

ping 127.0.0.1

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

wireless range extender

Charlie Gordon is the new technician at Beckman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

wrong ssid


Related study sets

BIO 161 ch. 17 - Transcription, RNA processing, and Translation

View Set

7 Major Schools of Thought in Psychology:

View Set

Symbols for Categorical and Quantitative Variables

View Set

HESI Case Study - Hip Fracture and Cellulitis

View Set

Indian History, From Shastri to Gandhi (16).

View Set