Networking (2) Flashcards

1
Q

You have recently setup a new virtual environment with multiple virtual machines. You need to protect these virtual machines and need that the entire environment is secured. Which device should you use?

Router

Virtual firewall

Virtual switch

A

Virtual firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which of the following methods can a cloud service provider overprovision the resources?

On-demand

Resource pooling

Measured service

A

Resource pooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are using a server to provide E-mail services to your employees. The server does not offer any other network services. Which of the following could you do to further secure the server on the network?

Block unused TCP ports on the server

Employ file hashing

Configure a static IP address on the server

A

Block unused TCP ports on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a client requests an IP configuration parameter from a DHCP server, which ports are used by the client and the server respectively?

Client - 68
Server - 67

Client - 67
Server - 67

Client - 67
Server - 68

A

Client - 68

Server - 67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is the newest motherboard firmware?

CMOS

UEFI

ATX

A

UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are being charged for the resources that you are using in the cloud. The cloud service provider is being billed for a per-hour basis. Which method is being used by the cloud service provider?

On-demand

Measured service

Resource pooling

A

Measured service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you are measuring the voltage of a wall socket, which of the following device you are using?

Crimper

Tone generator

Multimeter

A

Multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have to deploy a solution on a client site where the solution must consist of a Firewall, Anti-spam, Content filtering, DLP, and Malware scanner. The client wants to receive alerts if suspicious traffic is detected. It should also be able to provide reports on the number of viruses and spam messages blocked, and summaries of content filter violations.
The client does not want to load the network with multiple devices and wants a single solution. To be able to meet your goal, which of the following would be an optimal solution for the client?

Data Loss Prevention (DLP)

Content Filtering Tool

Unified Threat Management (UTM)

A

Unified Threat Management (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have configured a CIFS share on a Linux system. CIFS is configured to use port 445. You need to ensure that Windows 10 domain systems
should be able to use the share after successful authentication. The domain is set to the highest level. What should you do?

Configure the Linux server to disable NTLMv2 authentication

Configure the Linux server to accept only NTLMv2 authentication

Change the default port used for CIFS

A

Configure the Linux server to accept only NTLMv2 authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are going on a business trip oversea and you need to view your Google calendar in an airplane mode on your mobile device. How can you make your plans based on this calendar and make sure that you do not miss any important meetings?

Google calendar can be viewed offline

Your Google calendar can synchronize with the cloud in the airplane mode, so there is no issue in using the calendar as it is

By using the Wi-Fi service on the airplane and connecting the phone to the internet and making sure that the calendar has synchronized

A

By using the Wi-Fi service on the airplane and connecting the phone to the internet and making sure that the calendar has synchronized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have been asked to host web servers in a third-party shared cloud environment. These Web servers must communicate talk to the database servers located in a private cloud in your data center. Which type of cloud deployment model would be best in this scenario?

Public

Hybrid

Community

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following can be the drawbacks of a 10000rpm hard drive? (Choose all that apply)

Noise level

Energy consumption

Price

Compatibility with SAS devices

A

Noise level

Energy consumption

Price

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are valid reasons to choose to use 802.11n/ac over 802.11g?(Choose two)

Use of 2.4GHz frequencies provide more bandwidth and less interference

  1. 11g provides higher bandwidths

Provides larger channel bandwidths per user

Use of 5GHz frequencies incur less interference

A

Provides larger channel bandwidths per user

Use of 5GHz frequencies incur less interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are using a computer with an IP address of 192.168.2.44 and a subnet mask of 255.255.255.0. You can ping the destination of 192.168.2.66 but not 192.168.3.21 even though you know that the latter is a functioning workstation. The workstation with the IP address, 192.168.3.21 can ping systems on the 192.168.2.x subnet. What could be the reason for this?

The firewall between both the subnets is blocking the traffic

Duplicate MAC addresses have been detected

The default gateway is configured incorrectly

A

The default gateway is configured incorrectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you are designing a small network of 20 systems, which of the following should you use to ensure that there is no collision on the network?

Hub

Bridge

Switch

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following applications are cloud-based and are specifically designed for mobile phone or tablets? (Choose all that apply)

Dropbox

Sugar Sync

NetSuite

Salesforce

A

Dropbox

Sugar Sync

NetSuite

Salesforce

17
Q

You have a virtual environment with multiple virtual networks. These networks communicate with each other and with the physical network. Which of the following did you use to enable this communication?

Virtual Switch

Virtual Firewall

Virtual Router

A

Virtual Router

18
Q

You have joined as an IT Manager in a newly incorporated insurance firm. Your firm has set up a large data center with hundreds of servers and a team to manage it. You have been asked to deploy an insurance application, ensuring that the firm retains full control. Where would be the best place to deploy this application?

On-premise

Public Cloud

Managed hosting

A

On-premise

19
Q

The cloud service provider has assigned only a limited amount of resource to your cloud deployment. Which of the following method is being used by the cloud service provider?

Metered

Measured service

Resource pooling

A

Metered

20
Q

You want to allow IPv4 and IPv6 networks to function and interact during the transition phase from one protocol to the other. Which of these techniques is the most desirable from the point of view of ease of implementation, low overhead, and security considerations?

6to4 tunneling

Dual stack

IPv6 translation

A

Dual stack