Practice Test 7 Flashcards
A network device designed for managing the optimal distribution of workloads across multiple computing resources is known as:
Layer 3 switch
Access Point (AP)
Load balancer
Domain controller
Load balancer
Which of the terms listed below refers to a method that ignores the load balancing algorithm by consistently passing requests from a given client to the same server?
Round-robin method
Active-active configuration
Session affinity
Least connection method
Session affinity
In a round-robin method, each consecutive request is handled by: (Select best answer)
First server in a cluster
Next server in a cluster
Least utilized server in a cluster
Last server in a cluster
Next server in a cluster
In a weighted round-robin method, each consecutive request is handled in a rotational fashion, but servers with higher specs are designated to process more workload.
True
False
True
In active-passive mode, load balancers distribute network traffic across:
All servers
Servers marked as active
Least utilized servers
Servers marked as passive
Servers marked as active
In active-active mode, load balancers distribute network traffic across:
Least utilized servers
None of the servers
All servers
Most utilized servers
All servers
An IP address that doesn’t correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA).
True
False
True
What type of IP address would be assigned to a software-based load balancer to handle an Internet site hosted on several web servers, each with its own private IP address?
IPv4 address
Virtual IP address
Non-routable IP address
IPv6 address
Virtual IP address
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:
Captive portal
Access Point (AP)
Intermediate Distribution Frame (IDF)
Active hub
Access Point (AP)
Which of the following acronyms is used as a unique identifier for a WLAN (a wireless network name)?
BSS
SSID
ESS
IBSS
SSID
Disabling SSID broadcast:
Is one of the measures used in securing wireless networks
Makes a WLAN harder to discover
Blocks access to a WAP
Prevents wireless clients from accessing the network
Makes a WLAN harder to discover
A network security access control method whereby the 48-bit physical address assigned to each network card is used to determine access to the network is known as:
MAC filtering
Network Address Translation (NAT)
Static IP addressing
Network Access Control (NAC)
MAC filtering
Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage?
Logical network diagram
Protocol analyzer
WAP power level controls
Physical network diagram
WAP power level controls
Frequency bands for IEEE 802.11 networks include: (Select 2 answers)
5.0 GHz
2.4 GHz
5.4 GHz
2.0 GHz
- 0 GHz
2. 4 GHz
A common example of channel overlapping in wireless networking could be the 2.4 GHz band used in 802.11 networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.
True
False
True