Networking (2) Flashcards
You have recently setup a new virtual environment with multiple virtual machines. You need to protect these virtual machines and need that the entire environment is secured. Which device should you use?
Router
Virtual firewall
Virtual switch
Virtual firewall
In which of the following methods can a cloud service provider overprovision the resources?
On-demand
Resource pooling
Measured service
Resource pooling
You are using a server to provide E-mail services to your employees. The server does not offer any other network services. Which of the following could you do to further secure the server on the network?
Block unused TCP ports on the server
Employ file hashing
Configure a static IP address on the server
Block unused TCP ports on the server
When a client requests an IP configuration parameter from a DHCP server, which ports are used by the client and the server respectively?
Client - 68
Server - 67
Client - 67
Server - 67
Client - 67
Server - 68
Client - 68
Server - 67
Which is the newest motherboard firmware?
CMOS
UEFI
ATX
UEFI
You are being charged for the resources that you are using in the cloud. The cloud service provider is being billed for a per-hour basis. Which method is being used by the cloud service provider?
On-demand
Measured service
Resource pooling
Measured service
If you are measuring the voltage of a wall socket, which of the following device you are using?
Crimper
Tone generator
Multimeter
Multimeter
You have to deploy a solution on a client site where the solution must consist of a Firewall, Anti-spam, Content filtering, DLP, and Malware scanner. The client wants to receive alerts if suspicious traffic is detected. It should also be able to provide reports on the number of viruses and spam messages blocked, and summaries of content filter violations.
The client does not want to load the network with multiple devices and wants a single solution. To be able to meet your goal, which of the following would be an optimal solution for the client?
Data Loss Prevention (DLP)
Content Filtering Tool
Unified Threat Management (UTM)
Unified Threat Management (UTM)
You have configured a CIFS share on a Linux system. CIFS is configured to use port 445. You need to ensure that Windows 10 domain systems
should be able to use the share after successful authentication. The domain is set to the highest level. What should you do?
Configure the Linux server to disable NTLMv2 authentication
Configure the Linux server to accept only NTLMv2 authentication
Change the default port used for CIFS
Configure the Linux server to accept only NTLMv2 authentication
You are going on a business trip oversea and you need to view your Google calendar in an airplane mode on your mobile device. How can you make your plans based on this calendar and make sure that you do not miss any important meetings?
Google calendar can be viewed offline
Your Google calendar can synchronize with the cloud in the airplane mode, so there is no issue in using the calendar as it is
By using the Wi-Fi service on the airplane and connecting the phone to the internet and making sure that the calendar has synchronized
By using the Wi-Fi service on the airplane and connecting the phone to the internet and making sure that the calendar has synchronized
You have been asked to host web servers in a third-party shared cloud environment. These Web servers must communicate talk to the database servers located in a private cloud in your data center. Which type of cloud deployment model would be best in this scenario?
Public
Hybrid
Community
Hybrid
Which of the following can be the drawbacks of a 10000rpm hard drive? (Choose all that apply)
Noise level
Energy consumption
Price
Compatibility with SAS devices
Noise level
Energy consumption
Price
Which of the following are valid reasons to choose to use 802.11n/ac over 802.11g?(Choose two)
Use of 2.4GHz frequencies provide more bandwidth and less interference
- 11g provides higher bandwidths
Provides larger channel bandwidths per user
Use of 5GHz frequencies incur less interference
Provides larger channel bandwidths per user
Use of 5GHz frequencies incur less interference
You are using a computer with an IP address of 192.168.2.44 and a subnet mask of 255.255.255.0. You can ping the destination of 192.168.2.66 but not 192.168.3.21 even though you know that the latter is a functioning workstation. The workstation with the IP address, 192.168.3.21 can ping systems on the 192.168.2.x subnet. What could be the reason for this?
The firewall between both the subnets is blocking the traffic
Duplicate MAC addresses have been detected
The default gateway is configured incorrectly
The default gateway is configured incorrectly
If you are designing a small network of 20 systems, which of the following should you use to ensure that there is no collision on the network?
Hub
Bridge
Switch
Switch