Prep Test 5 Flashcards

1
Q

If you implement Windows Server 2012-based IPAM, which of the following would be true? [Choose two that apply.]
Answers

    A.
    It supports only a single DHCP server.
    B.
    You can use PowerShell to import non-Microsoft devices.
    C.
    It supports up to 2000 scopes.
    D.
    It supports only Microsoft devices.
A

A.
It supports only a single DHCP server.
D.
It supports only Microsoft devices.

IP address management (IPAM) is software that can plan, track, and manage the IP addresses used in a computer network. IPAM integrates Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) so that each is aware of changes in the other; for instance, DNS identifies the IP address of a client via DHCP and updates its database accordingly. Windows Server 2012-based IPAM only support Microsoft devices, and you can use PowerShell to import non-Microsoft devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 11 of 90
To which of the following does DiffServe provide low-latency? [Choose two that apply.]
Answers

    A.
    Voice
    B.
    Streaming media
    C.
    Web traffic
    D.
    file transfers
A

A.
Voice
B.
Streaming media

There are two principal approaches to QoS in IP networks, a parameterized system based on an exchange of application requirements with the network, and a prioritized system where each packet identifies a desired service level to the network. Differentiated Services (DiffServ) marks packets according to the type of service they require. In response to these markings, routers and switches use various queueing strategies to tailor performance to requirements. DiffServ can provide low-latency to voice or streaming media. On the other hand, it can provide best-effort service to non-critical services such as web traffic or file transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Question 12 of 90
When a client requests IP configuration parameter from a DHCP server, which ports are used by the client and the server respectively?
Answers
A.
Only port 67 for client and server
B.
Only port 68 for client and server
C.
Client - 67Server - 68
D.
Client - 68Server - 67
A

D.
Client - 68Server - 67

Dynamic Host Configuration Protocol (DHCP) automatically provides IP network configuration parameters such as IP addressing, subnet mask, gateway and DNS server information to network devices on the network. In a DHCP exchange, the client uses port 68 to communicate with the server while the server uses port 67 to communicate with the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 14 of 90
You are the security administrator for your organization. Recently, you started facing problems in connecting to the Web server on port 80. You want to troubleshoot this issue as soon as possible. What should you do?
Answers
A.
Use a protocol analyzer to capture packets between your system and the Web server
B.
Reboot the Web server
C.
Run a port scanner and check whether port 80 is opened
D.
Check the firewall ports on the Web server for port 80
E.
Check for the maximum number of users connected to the Web server

A

A.
Use a protocol analyzer to capture packets between your system and the Web server

A protocol analyzer is a software tool used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Ethernet and IP protocol analyzers usually organize data based on the OSI or the TCP/IP model. Using the protocol analyzer, you can capture the packets that are sent from the one system to another system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Question 16 of 90
Which of the following devices belong to the Network layer of the OSI model?
Answers
A.
Hub
B.
Router
C.
Switch
D.
Bridge
A

B.
Router

A router operates on the Network layer device since it examines packets at least up to their layer 3 headers. A router also performs routing based on the destination IP address found in each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 21 of 90
You have a small network of 100 computers and 10 servers. Each computer is configured to get an IP address from DHCP server. Servers are configured with the static IP addresses. A single DHCP pool is configured to lease IP addresses for seven days. While working on a server, you are prompted with the duplicate IP address error. You check the other servers and find that most of them are receiving the same message. What should you do to resolve this issue?
Answers
A.
Create a reservation in DHCP for all servers
B.
Run ipconfig /flushdns command on each server
C.
Configure each server to get IP address from DHCP server
D.
Create a new pool of DHCP server and configure servers to get IPs from this pool

A

A.
Create a reservation in DHCP for all servers

If you use a DHCP server and need to assign static IP addresses to network devices or servers, you should create reservations. In reservation, the IP address is bound to the MAC address of the device or server. DHCP, then, does not lease this IP address to any other device or system on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Question 23 of 90
You are creating a single IPv4 subnet that requires all computers to receive specific type of packets and process them. If the subnet has a router that protects these packets from being forward, then which of the following have you created?
Answers
A.
Physical domain
B.
Broadcast domain
C.
Collision domain
D.
Multicast domain
A

B.
Broadcast domain

A single IPv4 subnet is always configured within a single LAN segment. This means that the subnet in question is equivalent in scope to a broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 27 of 90
For which of the following situations would a media converter be used?
Answers
A.
Convert a coaxial antenna link to a UTP video connection
B.
Connect a wireless client to a wired access point
C.
Convert a fiber optic to a copper connection
D.
Connect a 100BASE-T to a 1000BASE-T link

A

C.
Convert a fiber optic to a copper connection

A media converter is a network device that allows the connection of two dissimilar network media types. Within the context of networking, a media converter is typically used to convert a fiber optic connection to copper (UTP or coaxial). Media converters are Layer 1 devices, that is, they don’t have any networking intelligence beyond the conversion of electrical signals to light and vice versa and thus they do not take any header information into account for their operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 28 of 90
Which of the following symptoms can a damaged cable cause in a network link? [Choose three that apply.]
Answers

    A.
    Increased network speeds
    B.
    Complete link failure
    C.
    Increase in port errors
    D.
    Degraded network performance
    E.
    Decrease in error checking ability
    F.
    Increase in jitter
A
B.
    Complete link failure
    C.
    Increase in port errors
    D.
    Degraded network performance

When troubleshooting a network and when beginning from the physical layer, one of the basic things that should be examined is the integrity of the physical cables being used. This is especially the case for patch cords that are often plugged and unplugged and those that connect end devices to the network jacks. The integrity of structured cabling should also be checked although damage to such infrastructure is less likely under normal circumstances. Damaged cables can cause a degradation in network performance, an increase in several port errors as well as a complete link failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Question 32 of 90
Which of the following does a VLAN provide?
Answers
A.
A logical segmentation of a network
B.
A physical segmentation of a network
C.
The partitioning of a network into collision domains
D.
Segmented cabling for each LAN
A

A.
A logical segmentation of a network

A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a network at the data link layer. VLANs work by applying tags to network packets and handling these tags in networking systems – creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate providing additional security despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Question 42 of 90
Which of the following technologies is likely to be used by a telecom service for cost efficient data transmissions for intermittent traffic between LANs?
Answers
A.
SIP Trunk
B.
Metropolitan Ethernet
C.
Frame Relay
D.
ATM
A

C.
Frame Relay

Frame Relay is a standardized wide area network (WAN) technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology. This technology aims to provide a telecommunication service for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Question 47 of 90
You need to design a Wi-Fi network in a remote area for a holiday resort. You are asked to design it in such a way to maximize coverage while minimizing the number of access points. There will be relatively few users and bandwidth requirements will be limited. Which of the following design parameters should you choose?
Answers
A.
Implement a wireless mesh network
B.
Use the 6.7 GHz frequencies
C.
Use the 2.4 GHz frequencies
D.
Provide a wired network infrastructure to support access points
E.
Use the 5 GHz frequencies
A

C.
Use the 2.4 GHz frequencies

In general, lower frequency radio waves are absorbed less by obstacles than higher frequency radio waves. Obstacles can include air, humidity as well as walls, furniture, and people. For this reason, if all else is equal, 2.4GHz frequencies provide a larger coverage area than. Also, since the area is remote, it will not be affected by interference from other 2.4GHz sources and bandwidth requirements are low. This means that the advantages of the 5 GHz frequencies are not useful in this case, so the use of 2.4GHz frequencies is the best choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Question 49 of 90
If you were to perform remote file system management of the network devices, which of the protocol will you use?
Answers
A.
SMB
B.
FTPS
C.
FTP
D.
TFTP
A

B.
FTPS

File transfer protocol Secure (FTPS) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols to provide security and confidentiality to file transfers. FTPS, along with the insecure TFTP and FTP protocols, are used extensively for remote file system management of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 58 of 90
You configured a Web server on your Windows system to allow others on the local network to view a Web page that you created. Users attempt to connect, however, are unable to either by using the Website URL or the IP address. You can ping the Website URL and it resolves to the correct IP address. You verify that the web server is up. What is the probable cause?
Answers
A.
The Web server must be configured to accept incoming requests.
B.
The DNS service is unresponsive.
C.
The firewall on your system is blocking incoming requests
D.
The Hosts file on your system is not updated with the correct IP address for the Website.

A

C.
The firewall on your system is blocking incoming requests

Host-based firewall settings are those that are configured on each individual workstation. The firewall may be provided by the operating system itself or may be a standalone software package that provides security features and functionalities to the network connection of the device. If there are incorrect settings on this firewall, legitimate services may be blocked, and if so, a message usually informs the user of such a violation. In such cases, firewall settings should be adjusted to allow for desired services to function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Question 59 of 90
A user of a corporate wireless network sees multiple networks with the same corporate SSID listed in the available wireless networks. Which of the following attacks might the user become a victim of?
Answers
A.
Rogue access point
B.
Evil twin
C.
Wireless security breach
D.
War-driving
E.
Wi-Fi poisoning
A

B.
Evil twin

An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications. This type of attack may be used to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves setting up a fraudulent web site and luring people there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question 62 of 90
Refer to the following two statements concerning Wi-Fi networks:

The 5GHz frequency band provides higher data rates than the 2.4GHz band
The 2.4 GHz frequency band is affected less by physical obstacles than the 5GHz band
Which of the above statements is true?
Answers
A.
Only statement 1
B.
Neither
C.
Statement 1 and 2
D.
Only statement 2
A

C.
Statement 1 and 2

In general, lower frequency radio waves are absorbed less by obstacles than higher frequency radio waves. Obstacles can include air, humidity as well as walls, furniture and people. For this reason, if all else is equal, 2.4GHz frequencies provide a larger coverage area than 5GHz frequencies. Conversely, higher frequencies have higher data capacities and thus can provide higher data rates. Thus, the 5GHz frequency band does provide higher data rates than the 2.4GHz band.

17
Q

Question 69 of 90
A DHCP server on your organization’s network is configured to lease IP addresses for 10 days. After the lease to a device is over, what happens to this IP address?
Answers
A.
It is immediately assigned to another available device.
B.
It is not reassigned immediately but is considered expired for a grace period.
C.
It is immediately assigned to the same device.
D.
It is added back to the DHCP pool with immediate effect.

A

B.
It is not reassigned immediately but is considered expired for a grace period.

DHCP is a network protocol that allows dynamic IP allocation to IP clients. This protocol has made the administration and the management of IP addresses within a company easier to do and maintain. To avoid IP conflicts that can arise from discrepancies in the lease times (a server may assign an address to a new device even though another device “thinks” it still has a lease on it) addresses whose lease expires are not reassigned immediately but are considered expired for a grace period.

18
Q
Question 70 of 90
Which of the following protocols is considered a type of directory service?
Answers
A.
LDAP
B.
Kerberos
C.
AAA
D.
RADIUS
E.
TACACS+
A

A.
LDAP

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network. Directory services allow the sharing of information about users, systems, networks, services, and applications throughout the network. LDAP offers a centralized directory server for network resources to query when authentication is attempted using a username and password. LDAP is typically used in single sign-on scenarios.

19
Q

Question 72 of 90
Which of the following are examples of inherence? [Choose three that apply.]
Answers

    A.
    IRIS pattern
    B.
    Password
    C.
    Voice
    D.
    Fingerprint
    E.
    Four-digit PIN
    F.
    Security Token
A
A.
    IRIS pattern
Voice
    D.
    Fingerprint

An inherence factor is something you are. It uses characteristics such as a fingerprint, voice, or iris pattern as an inherent biometric.

20
Q

Question 73 of 90
Which of the following can be one or more risks in a hybrid cloud deployment? [Choose two that apply.]
Answers

A.
High failures in data synchronization
B.
Security of multiple platforms
C.
Difficult deployment across multiple platforms
D.
Seamless communication amongst platforms
A

b Security across multiple platforms – managing security can be difficult.
d Seamless communication amongst platforms

There are two key risks in a hybrid deployment: