Networking (3) Flashcards
If you install smart light switches, which of the following would you be able to perform? (Choose all that apply)
Configure a schedule
Use motion sensors
Enable geofencing
Control them remotely
Configure a schedule
Use motion sensors
Enable geofencing
Control them remotely
You want to configure Service Locator Protocol (SLP) on your network. You want to use it for the devices to announce their services. To be able to achieve this goal, which of the following criteria must be met? (Choose all that apply)
Each service must have a URL
Each device must always be in scope
A device must not be able to see services in scope that it is not part of
Each service must have unlimited attributes
Each service must have a URL
Each device must always be in scope
Each service must have unlimited attributes
You manage a Windows network. The network has 100 desktops that are configured to get an IP address from the DHCP server. Servers are configured with static IP addresses. You connect a new laptop on the network, and it receives an IP address of 169.254.0.1. The DHCP server, however, leases the IP addresses from the 192.168.10.0 range with the capacity of 200 IP address. Other computers on the network are getting the IP addresses from this range. What could be the possible problem?
The switch port is non-functional
The network adapter drivers are outdated
The patch cable is faulty
The patch cable is faulty
Your organization’s firewall is protecting the critical servers such as DNS and DHCP. From outside the network, you use the dig command and are able to gain critical information as part of the reconnaissance process. How could this be possible? (Choose all that apply)
DNS server is sending replies that are larger than 512 bytes
UDP port 53 is open on the firewall
DNS server is configured to allow zone relocation to any DNS server
TCP port 53 is open on the firewall
DNS server is configured to allow zone relocation to any DNS server
TCP port 53 is open on the firewall
When you reboot your system after a new graphics adapter was installed, you get a blank screen. The system does not proceed beyond the blank screen. Which of the following can be a root cause of this? (Choose all that apply)
BIOS configuration
RAM
Video adapter
BIOS configuration
You are facing an LTE connectivity issue on your iPhone. You are not able to re-establish the LTE connectivity. The LTE connectivity had been working earlier. Which of the following methods can possibly resolve this issue? (Choose all that apply)
Toggle between mobile data and Airplane mode
Verify the cellular connection settings
Reset the network settings
Update the iPhone
Turn off the SIM PIN
Toggle between mobile data and Airplane mode
Verify the cellular connection settings
Reset the network settings
Update the iPhone
Turn off the SIM PIN
You have recently configured a hypervisor server and created multiple virtual machines on it. You need these virtual machines to only communicate with each other. What should you do?
Create a virtual router and use its address as a default gateway
Configure each virtual machine to run in isolation
Create a virtual switch and connect the virtual machines to it
Create a virtual switch and connect the virtual machines to it
You are not able to install third-party apps on your Android device. What should you do to ensure that you are able to install a third-party app?
Ensure there is enough storage space
Enable the Unknown Sources option
Enable the install from storage option
Enable the Unknown Sources option
You are securing a router that will be installed on the edge of the network. You have been mandated that you should check for the methods of remote connectivity to the router. You start the test with the edge router and can detect that there are ports open for remote connectivity. After your test is complete, which of the following ports should you recommend closing on this router? (Choose all that apply)
3389
22
23
80
22
23
How can you open a smart door lock? (Choose all that apply)
Using Bluetooth
Using a mobile phone
Using a key
Using a key code
Using Bluetooth
Using a mobile phone
Using a key
Using a key code
When using a Windows gaming system, which of the following are likely to be used for the high-definition digital audio? (Choose all that apply)
Lightning
S/PDIF
DisplayPort
HDMI
S/PDIF
HDMI
RAID has been implemented on a system. The RAID falls after a single drive failure. Which type of RAID was configured?
RAID 10
RAID 5
RAID 0
RAID 0
You have an e-commence application that needs to be implemented. Implementing the application includes allowing access to external users on the internet. You want to ensure the application is protected from cross-site scripting (XSS) and SQL injection. You want to prevent QSI Layer 7 traffic. To meet the criteria in the scenario, which of the following should you implement along with the application?
URL filtering
Application Firewall
Network Firewall
Application Firewall
Which of the following can be a security concern with the digital assistant?
Confidentiality
Integrity
Privacy
Privacy
Which of the following statement would be correct for Demilitarized Zone (DMZ)
The servers in the DMZ can connect to the internet but not to the internal network
The internal network does not have access to the servers in the DMZ but not the internet
The servers in the DMZ can connect only to the internal network
The servers in the DMZ can connect to the internet but not to the internal network
If you are using G Suite that is hosted in the cloud, which type of billing can you receive? (Choose all that apply)
Quarterly
Half Yearly
Yearly
Monthly
Yearly
Monthly
You have been appointed as the administrator of a production Wi-Fi network using the 802.11n Wi-Fi standard at the 2.4 GHz frequency band. After performing a site survey, you discover that there are no sources of interference at the 2.4GHz frequency in the area. You are asked to increase the bandwidth available to the end devices without purchasing new equipment. How would you accomplish this?
Double the channel bandwidth used from 20 MHz to 40 MHz
Double the channel bandwidth used from 150 Mbps to 300 Mbps
Double the channel bandwidth used from 10 MHz to 20 MHz
Double the channel bandwidth used from 20 MHz to 40 MHz
You administer a Windows-based network of a single subnet. You have an internal Website that users access by using its domain name. However, users have are starting to complain that the Website is no longer accessible. When you test, you can browse the Website only by its IP addresses, but not by the URL.
You also attempt to ping another computer on the network with its name, but you are unable to do so. What could be the probable cause?
Nslookup must be enabled to allow for name resolution
The Web browser is outdated
DNS server is probably unresponsive
DNS server is probably unresponsive
Which of the following applications are considered as cloud-based storage that can synchronize files with your desktop? (Choose all that apply)
Google Drive
Box
OneDrive
Dropbox
Google Drive
Box
OneDrive
Dropbox
You have a Windows 10 system on which you are running three Windows 8.1 virtual machine using VMware Workstation. The Windows 10 system is configured with Windows Firewall. The Windows 10 system is configured with direct internet access. You need to shape the virtual machines to access the internet. Each virtual machine should be able to communicate with each other. What should you do?
Configure the virtual NICs on the virtual machine to bridge mode
Configure each virtual machine in the NAT mode
Configure the Windows 10 system to use a proxy server for internet access
Configure the virtual NICs on the virtual machine to bridge mode
You need to replace an RJ-45 connector at the end of an Ethernet cable. Which of the following tool will you use?
Tone generator
Multimeter
Crimper
Crimper