Practice (5) Flashcards
Which of the following are technologies typically used for personal area networks (PANs)? (Choose all correct answers.)
RFID
Z-Wave
ISDN
NFC
Bluetooth
Z-Wave
NFC
Bluetooth
Bluetooth, Z-Wave, and near-field communication (NFC) are all short-range wireless technologies that are capable of providing communications between PAN devices. The other options are not suitable for PAN communications. Radio-frequency identification (RFID) uses tags containing data, frequently embedded in pets, which can be read using electromagnetic fields. Integrated Services Digital Network (ISDN) is a wide area networking technology that uses the telephone infrastructure to provide a high-speed dial-up service
Which of the following types of network devices can provide authentication services for multiple remote access servers using the device’s own account database?
NAS
NGFW
RADIUS
RADIUS
A Remote Authentication Dial-In User Service (RADIUS) server can provide authentication, authorization, and accounting services for remote access servers. Intrusion detection systems (IDSs), next-generation firewalls (NGFWs), and network attached storage (NAS) devices do not provide authentication services
You are designing the network for your company’s new branch office, and you need a device on which administrators can create virtual local area networks and that will forward traffic between them. Which of the following types of devices can do this?
Broadband router
Load balancer
Multilayer switch
Multilayer switch
A multilayer switch is a network connectivity device that functions at both the data link layer (layer 2) and the network layer (layer 3) of the OSI model. At layer 2, the device functions like a normal switch, creating an individual collision domain for each connected node and enabling administrators to create multiple VLANs. At layer 3, the device also provides routing capabilities by forwarding packets between the VLANs. Virtual routers, load balancers, and broadband routers are strictly layer 3 devices that can route traffic but cannot create VLANs
You are setting up a new network for which you have been given the IPv4 network address 10.61.0.0/19. You want to calculate the number of hosts you can create on each subnet. How many bits are allocated to the host identifier in an IPv4 address on this network?
5
8
13
13
The value after the slash in a classless inter-domain routing (CIDR) address specifies the number of bits in the network identifier. An IP address has 32 bits, so if 19 bits are allocated to the network identifier, 13 bits are left for the host identifier
The protocols that are responsible for the delivery of data packets to their final destinations on an internetwork operate at which layer of the Open Systems Interconnection (OSI) model?
Application
Session
Transport
Network
Data link
Network
On a TCP/IP network, the Internet Protocol (IP) at the network layer is the protocol responsible for the delivery of data to its final destination, using IP addresses that can be routed through an internetwork. Data link layer protocols are only concerned with communication between devices on a local area network (LAN) or between two points connected by a wide area network (WAN). The transport, session, and application layers are not involved in the actual delivery of data
Originally, storage area networks (SANs) were dedicated solely to storage-based traffic. A local area network (LAN) was also required for other types of traffic. Today, however, it is possible for SAN and LAN traffic to coexist on a single network medium. Which of the following SAN protocols are capable of sharing a network medium with standard LAN traffic? (Choose all correct answers.)
InfiniBand
Fibre Channel
iSCSI
FCoE
iSCSI
FCoE
The iSCSI protocol runs on a standard IP network, and the Fibre Channel over Ethernet (FCoE) variant runs on a standard Ethernet network. Both of these protocols can share a network with LAN traffic, although the use of a quality of service (QoS) mechanism is usually recommended. The original Fibre Channel implementation and InfiniBand both require a dedicated network medium that does not support LAN traffic
Which of the following WAN technologies use digital signaling? (Choose all correct answers.)
ISDN
CATV
ATM
PSTN
DSL
SONET
ISDN
CATV
ATM
DSL
SONET
Integrated Services Digital Network (ISDN), cable television network (CATV), Asynchronous Transfer Mode (ATM), Digital Subscriber Line (DSL), and Synchronous Optical Network (SONET) are all digital networks. Public Switched Telephone Network (PSTN) is the standard telephone network, an analog, circuit-switched service
You are planning an automated operating system deployment for 100 new Windows workstations your company has received. You intend to configure the workstations to boot using PXE, during which time the system will obtain an IP address from a DHCP server and then download a boot image file from a TFTP server. Which of the following well-known ports must you open on the firewall separating the workstations from the servers? (Choose all correct answers?)
64
65
66
67
68
69
67
68
69
Dynamic Host Configuration Protocol (DHCP) servers use well-known port numbers 67 and 68. The Trivial File Transfer Protocol (TFTP) uses port number 69. Neither protocol uses port 64, 65, or 66
Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you submitted a change request for a new software product at the monthly meeting of the company’s change management team. Now that the change request has been approved, it is time to implement the change. Which of the following administrative tasks will most likely be the change management team’s responsibility during the implementation process? (Choose all correct answers.)
Notifying users
Documenting all modifications made
Authorizing downtime
Designating a maintenance window
Authorizing downtime
Designating a maintenance window
The change management team is usually not responsible for tasks directly involved in the implementation of the changes they approve. Therefore, they would not be the ones to notify users exactly when the change will take place or document the procedure afterward. They would, however, be responsible for providing a maintenance window, during which the change must occur, and authorizing any downtime that would be needed
You are installing a new server that is equipped with two power supplies. The server’s firmware enables you to set the mode in which the power supplies will be used. In which of the following modes must the dual power supplies be running for the system to be fault tolerant?
Individual mode
Combined mode
Redundant mode
Redundant mode
A server with dual power supplies can run in one of two modes: redundant or combined. In redundant mode, each of the power supplies is capable of providing 100 percent of the power needed by the server. Therefore, the server can continue to run if one power supply fails, making it fault tolerant. In combined mode, both power supplies are needed to provide the server’s needs, so a failure of one power supply will bring the server down. Individual mode and hot backup mode are not terms used for this purpose
The Domain Name System (DNS) defines a hierarchical name space, locations in which are reflected in fully qualified domain names (FQDNs). Which of the words in the FQDN www.paris.mydomain.org represents the bottommost layer in the DNS namespace’s domain hierarchy?
www
paris
mydomain
paris
Paris is the bottommost domain in the given FQDN
Paris is a subdomain within Mydomain, and Mydomain is a second-level domain registered by a particular organization. The topmost layer in the DNS hierarchy is represented by org, which is a top-level domain. In this FQDN, www is not the name of a domain; it is the name of a particular host in the paris.mydomain.org domain
The term datagram is typically used by protocols offering connectionless delivery service. Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all correct answers.)
TCP
IP
UDP
Ethernet
IP
UDP
The two main connectionless protocols in the TCP/IP suite are the Internet Protocol (IP) and the User Datagram Protocol (UDP), both of which use the term datagram for their protocol data units. Ethernet uses the term frame, and Transmission Control Protocol (TCP) uses the term segment
After using a tape backup solution for years, you have recently started backing up your server to an external hard disk drive. Your backup schedule calls for weekly full backups and daily incremental backups. In the past, performing a restore required multiple jobs, but now only a single job is needed. Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?
Because hard drives can transfer data faster than tape drives
Because hard drives hold more data than tape drives
Because hard drives are random access devices and tape drives are not
Because hard drives are random access devices and tape drives are not
Data is stored on tape drives in a linear fashion. Once you write backup data to a tape, you cannot selectively replace individual files. When you perform a restore job, you have to restore the most recent full backup, followed by incremental backups, which overwrite some of the full backup files with newer ones. Hard disk drives are random access devices, meaning that individual files can be written to and read from any location on the disk. When you perform incremental backup jobs to a hard disk, the software can restore data using any version of each file that is available. Data capacity, transfer speed, and block size are not relevant to the number of jobs required
You have just received notification of a new software release for an application you are running on your servers. The release is intended to address a newly discovered security vulnerability. Which of the following is the correct term for a software release containing a fix designed to address one specific issue?
An upgrade
A patch
A service pack
A patch
A patch is a relatively small update that is designed to address a specific issue, often a security exploit or vulnerability. Patches do not add features or new capabilities; they are fixes targeted at a specific area of the operating system. Updates, upgrades, and service packs are larger packages that might include new features and/or many different fixes
Twisted pair cables consist of multiple pairs of wires within a sheath, with each pair of wires twisted together separately. Which of the following statements best explains the reason for the twists in twisted pair cabling?
The twists help to prevent crosstalk in adjacent wire pairs and limit the effects of electromagnetic interference (EMI) on the signals carried over the cable.
The twists make it easier for installers to attach connectors to the cable ends.
The twists extend the cable’s bend radius allowance, making it easier to install.
The twists help to prevent crosstalk in adjacent wire pairs and limit the effects of electromagnetic interference (EMI) on the signals carried over the cable.
The twisted wire pairs inside twisted pair cable prevent the signals on the different wires from interfering with each other (which is called crosstalk). The twists also provide resistance to outside electromagnetic interference. The twists have no effect on collisions. The twists do nothing to facilitate the attachment of connectors. Twists have nothing to do with the bend radius allowance for the cable