Practice Test 7 Flashcards

1
Q

A network device designed for managing the optimal distribution of workloads across multiple computing resources is known as:

Layer 3 switch
Access Point (AP)
Load balancer
Domain controller

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the terms listed below refers to a method that ignores the load balancing algorithm by consistently passing requests from a given client to the same server?

Round-robin method
Active-active configuration
Session affinity
Least connection method

A

Session affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a round-robin method, each consecutive request is handled by: (Select best answer)

First server in a cluster
Next server in a cluster
Least utilized server in a cluster
Last server in a cluster

A

Next server in a cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a weighted round-robin method, each consecutive request is handled in a rotational fashion, but servers with higher specs are designated to process more workload.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In active-passive mode, load balancers distribute network traffic across:

All servers
Servers marked as active
Least utilized servers
Servers marked as passive

A

Servers marked as active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In active-active mode, load balancers distribute network traffic across:

Least utilized servers
None of the servers
All servers
Most utilized servers

A

All servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IP address that doesn’t correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA).

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of IP address would be assigned to a software-based load balancer to handle an Internet site hosted on several web servers, each with its own private IP address?

IPv4 address
Virtual IP address
Non-routable IP address
IPv6 address

A

Virtual IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:

Captive portal
Access Point (AP)
Intermediate Distribution Frame (IDF)
Active hub

A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following acronyms is used as a unique identifier for a WLAN (a wireless network name)?

BSS
SSID
ESS
IBSS

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disabling SSID broadcast:

Is one of the measures used in securing wireless networks
Makes a WLAN harder to discover
Blocks access to a WAP
Prevents wireless clients from accessing the network

A

Makes a WLAN harder to discover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network security access control method whereby the 48-bit physical address assigned to each network card is used to determine access to the network is known as:

MAC filtering
Network Address Translation (NAT)
Static IP addressing
Network Access Control (NAC)

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage?

Logical network diagram
Protocol analyzer
WAP power level controls
Physical network diagram

A

WAP power level controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Frequency bands for IEEE 802.11 networks include: (Select 2 answers)

5.0 GHz
2.4 GHz
5.4 GHz
2.0 GHz

A
  1. 0 GHz

2. 4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A common example of channel overlapping in wireless networking could be the 2.4 GHz band used in 802.11 networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?

Dipole antenna
Dish antenna
Unidirectional antenna
Yagi antenna

A

Dipole antenna

17
Q

Which of the antenna types listed below provide a 360-degree horizontal signal coverage? (Select 2 answers)

Unidirectional antenna
Dipole antenna
Dish antenna
Omnidirectional antenna
Yagi antenna
A

Dipole antenna

Omnidirectional antenna

18
Q

Which of the following answers refer to highly directional antenna types used for long-range point-to-point bridging links? (Select 2 answers)

Dipole antenna
Omnidirectional antenna
Dish antenna
Non-directional antenna
Unidirectional antenna
A

Dish antenna

Unidirectional antenna

19
Q

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

War chalking
Tailgating
War driving
Shoulder surfing

A

War driving

20
Q

A type of architecture in which most of the network configuration settings of an Access Point (AP) are set and managed with the use of a central switch or controller is called:

Thin AP
Infrastructure mode
Fat AP
Ad hoc mode

A

Thin AP

21
Q

“The term ““Fat AP”” refers to a stand-alone Access Point (AP) device type offering extended network configuration options that can be set and managed after logging in to the device.”

True
False

A

True

22
Q
A technology that allows for real-time analysis of security alerts generated by network hardware and applications is known as:
LACP
DSCP
SIEM
LWAPP
A

SIEM

In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.

23
Q

Which of the following statements describing the functionality of SIEM is not true?

Data can be collected from many different sources
Collected data can be processed into actionable information
Automated alerting and triggers
Time synchronization
Event deduplication
Use of rewritable storage media

A

Use of rewritable storage media

24
Q

Which of the terms listed below refers to computer data storage systems, data storage devices, and data storage media that can be written to once, but read from multiple times?

DVD-RW
Tape library
Floppy disk
WORM

A

WORM

Write once read many describes a data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device.

25
Q

Which of the following acronyms listed refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

DRP
DHE
DLP
DEP

A

DLP

Data loss prevention