Prep Test 9 Flashcards

1
Q

Question 7 of 90
Which of the following are true about Windows Server 2012-based IPAM? [Choose all that apply.]
Answers

A.
It supports up to 2000 scopes.
B.
It can support up to three years of forensic data.
C.
It must be installed and configured on a member server.
D.
It does not support any external database.
E.
It supports only a single DHCP server.
A

Following statements are true:
C
It must be installed and configured on a member server.
B
It can support up to three years of forensic data.
D
It does not support any external database.

It can support up to 150 DHCP servers and 40,000 scopes.

IP address management (IPAM) is software that can plan, track, and manage the IP addresses used in a computer network. IPAM integrates Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) so that each is aware of changes in the other; for instance, DNS identifies the IP address of a client via DHCP and updates its database accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Question 9 of 90
Which of the following technologies can provide a 1000BASE-LX standard connection to the customer premises?
Answers
A.
Metropolitan Ethernet
B.
DSL
C.
Dial-up
D.
Cable broadband
A

A.
Metropolitan Ethernet

Metropolitan Ethernet, also known as Metro Ethernet is a WAN technology that is based on the Ethernet standard, which traditionally is a LAN technology. It is commonly used to connect subscribers to a larger service network or the Internet. Businesses can also use Metro Ethernet to connect their own offices to each other. Because Ethernet standards are used, a telco may provide an Ethernet based 1000BASE-LX or 10GBASE-LX standard connection to the customer’s premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 10 of 90
Which of the following is the correct use case for a public cloud? [Choose two that apply.]
Answers

A.
Need for high-performance requirements for accessing storage or filesystems
B.
Need for the auto-scaling environment to host large Web applications
C.
Need for strict government regulations compliance and data privacy
D.
Hosting of latency intolerant Web tiers
E.
Need for high configurability and flexibility
A

The correct use cases for a public cloud are:
B
Need for the auto-scaling environment to host large Web applications
D
Hosting of latency intolerant Web tiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 11 of 90
Which of the following are characteristics of the Internet Protocol (IP)?

    IP addresses must be globally unique
    The IP protocol is involved in the routing process
    The IP protocol provides error correcting mechanisms
    A session is established between hosts before transmission begins
    IP provides security to networks by encapsulating the data into an IP datagram.
Answers
A.
2, 3, 5
B.
3, 4, 5
C.
1, 2, 5
D.
2, 3, 4
E.
1, 2, 3
A

C.
1, 2, 5

Internet Protocol (IP) is the principle network layer protocol used on the Internet for relaying datagrams, called packets at the network layer, from source to destination. IP addresses must be globally unique, and the IP protocol is largely responsible for the routing process. IP does not provide error correcting mechanisms, nor does it establish a session. These functionalities are found at higher layers of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 13 of 90
What would be the key reason for which Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is used with Wi-Fi networks? [Choose two that apply.]
Answers

A.
Collision detection is impossible in a wireless network.
B.
Collision Detection is implemented on a wired medium by detecting higher than normal voltages on an Ethernet cable.
C.
Collision Avoidance cannot be implemented on a wired network.
D.
Collision Avoidance has less overhead than Collision Detection.
A

B.
Collision Detection is implemented on a wired medium by detecting higher than normal voltages on an Ethernet cable.
C.
Collision Avoidance cannot be implemented on a wired network.

Collision detection is accomplished on a wired medium by detecting higher than normal voltages on an Ethernet cable that are produced by collisions. The wireless medium does not produce a similar phenomenon when collisions occur. So, collision detection is impossible. Collision avoidance mechanisms however are employed to deal with such occurrences on the wireless medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 15 of 90
Which of the following are application layer protocols? [Choose three that apply.]
Answers

    A.
    IPsec
    B.
    IGMP
    C.
    HTTP
    D.
    IMAP
    E.
    TCP
    F.
    FTP
A
C.
    HTTP
    D.
    IMAP
    F.
    FTP
The Application layer of the OSI model is responsible for the communications protocols and interface methods used in process-to-process communications across a network. Application layer protocols include DHCP, DHCPv6, DNS, FTP, HTTP, IMAP, IRC, LDAP, MGCP, NNTP, NTP, POP, RPC, RTP, RTSP, SIP, SMTP, SNMP, SOCKS, SSH, Telnet, TLS/SSL, XMPP, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Question 25 of 90
You have an existing wireless network that operates at 2.4 GHz. However, due to many devices operating at this speed in your office environment, the wireless network is providing poor speed. You need to ensure that you upgrade the wireless network to a specification that does not have interference with these devices. Which of the following wireless network specification would be the best choice? [Choose two that apply.]
Answers
    A.
    802.11n
    B.
    802.11b
    C.
    802.11g
    D.
    802.11a
A

A.
802.11n
D.
802.11a

You can either upgrade the wireless network to 802.11a or 802.11n. The 802.11a specification works at 5GHz and the 802.11n specification works at 2.4 and 5 GHz. You will need to make it work at 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Question 28 of 90
A large enterprise is moving to a new complex and is designing the network that will serve its new buildings. The buildings are all within a five-kilometer radius and are built on privately owned grounds. The network will interconnect the buildings using privately owned cabling and network equipment. What type of network is this enterprise developing?
Answers
A.
Campus Area Network (CAN)
B.
Wide Area Network (WAN)
C.
Metropolitan Area Network (MAN)
D.
Enterprise Area Network (EAN)
E.
Local Area Network (LAN)
A

A.
Campus Area Network (CAN)

A Campus Area Network (CAN), also known as a Corporate Area Network, is a computer network made up of an interconnection of LANs within a limited geographical area. Networking equipment (switches, routers) as well as transmission media (copper cabling, optical fiber) are almost always entirely owned by the campus tenant o owner. A CAN is generally larger than a LAN and smaller than a MAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 35 of 90
You are comparing two types of networks:

A network that creates a dedicated communication path between the communicating devices. This path is maintained until the communication ends.
A network where data is grouped into packets that are sent individually over a network. Each packet is directed independently based on the addressing information found in its header. Which of the following comparisons are true?

[Choose two that apply.]
Answers

A.
(2) requires the initial establishment of a connection while (1) does not
B.
(2) is more reliable than (1)
C.
(2) is more efficient and uses fewer network resources than (1)
D.
Delay between data units is uniform for (1) but not for (2)
A

C.
(2) is more efficient and uses fewer network resources than (1)
D.
Delay between data units is uniform for (1) but not for (2)

(1) Describes a circuit-switched network which initially establishes a dedicated communication path between the communicating devices which is maintained until the communication ends. The traditional Public Switched Telephone Network (PSTN) is one such network. (2) describes a packet-switched network which is one where data is grouped into packets that are sent individually over a network. Each packet is directed over the network independently based on the addressing information found in its header. Modern IP-based networks are packet-switched networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Question 36 of 90
You are provided with a fiber optic link of four kilometers using a single pair of single mode fiber optic strands. Which of the following Ethernet deployment standard would you use to achieve 1 Gbps speeds while keeping costs at a minimum?
Answers
A.
100BASE-LX
B.
1000BASE-TX
C.
1000BASE-SX
D.
1000BASE-LX
A

D.
1000BASE-LX

1000BASE-LX is a fiber optic Gigabit Ethernet standard specified in IEEE 802.3. 1000BASE-LX is specified to work over up to 5 km over 10 µm single-mode fiber. Although the 10GBASE-T standard would also suffice for this application, it is by far a more expensive solution, so the best choice would be 1000BASE-LX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
uestion 38 of 90
You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?
Answers
A.
SMBP with port 445
B.
NetBIOS with port 445
C.
SMB with port 445
D.
FTP with port 445
A

C.
SMB with port 445

Server Message Block (SMB) is an application layer network protocol used primarily for providing shared access to files, printers and serial ports between nodes on a network. It is mostly used on computers running Microsoft Windows although similar versions such as Samba have been developed for Unix-like operating systems as well. SMB uses port 445.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Question 46 of 90
You want to implement a network that provides a data carrying technique to direct traffic from one network node to the next based on short path labels rather than long network addresses. The network should avoid complex lookups in a routing table. Which of the following network should you implement?
Answers
A.
Frame Relay
B.
ATM
C.
PPPoE
D.
MPLS
A

D.
MPLS

Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks. MPLS directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links between distant nodes rather than endpoints. MPLS can encapsulate packets of various network protocols, hence its name multiprotocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Question 51 of 90
You are asked to determine which Ethernet deployment standard should be used to interconnect a telecom closet on the 10th floor of a building to the data center found on the first floor. Maximum speeds required are 1000 Mbps while multi-mode fiber is used for this link with a total cable length of no more than 450 meters. What would be the best choice?
Answers
A.
1000BASE-LX
B.
1000BASE-TX
C.
100BASE-LX
D.
1000BASE-SX
A

D.
1000BASE-SX

1000BASE-SX is an optical fiber Gigabit Ethernet standard for operation over multi-mode fiber. The standard specifies a maximum length of 550 depending on the type of multi-mode fiber used, however, in practice, with good quality fiber, optics, and terminations, 1000BASE-SX will usually work over significantly longer distances. Although the 10GBASE-T standard would also suffice for this application, it would be considered overkill so the best choice would be 1000BASE-SX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 60 of 90
Which of the following elements would you expect to find in a non-disclosure agreement? [Choose three that apply.]
Answers

    A.
    The definition of what is confidential information
    B.
    Password policy definition
    C.
    Acceptable use policy
    D.
    The term the agreement is binding
    E.
    Identification of the parties involved
A

A.
The definition of what is confidential information
D.
The term the agreement is binding
E.
Identification of the parties involved

A non-disclosure agreement (NDA), is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes but wish to restrict access to or by third parties. It is a contract through which the parties agree not to disclose information covered by the agreement. Employees that use the network, as well as contractors that may be required to do work on the network, are obligated not to disclose information that may be necessary for them to obtain for the purposes of their partnership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question 62 of 90
For which of the following applications is InfiniBand suitable? [Choose two that apply.]
Answers

A.
High speed wireless bridge between networks
B.
Connection between data storage systems
C.
Connection between storage systems and servers
D.
40 and 100 Gbps Ethernet connections between switches
A

B.
Connection between data storage systems
C.
Connection between storage systems and servers

InfiniBand is a computer-networking communications standard used in high-performance computing that features very high throughput and very low latency. It is used for data interconnect both among and within computers. InfiniBand is also used as either a direct or switched interconnect between servers and storage systems, as well as an interconnect between storage systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Question 72 of 90
You are interconnecting fiber optic cabling in a telecom closet. You discover that the only types of patch cables available to you are those with SC connectors. Which transceiver type is required?
Answers
A.
GBIC
B.
SFP
C.
SFP+
D.
QSFP
A

A.
GBIC

A Gigabit Interface Converter (GBIC) is a hot-swappable optic module transceiver that can terminate different types of fiber optic cabling. The connector type used for GBIC modules is SC. It is generally larger than the more popular SFP standard and is slowly being phased out.

17
Q

Question 78 of 90
You recently installed a new 802.11g wireless network for an organization. Most of the users are happy with the performance of the wireless network but some of the users continuously complain about the poor performance. These users complain that because of the poor performance of the wireless network, their systems often hang as applications continuously search for the network. What could be the possible issue in this scenario?
Answers
A.
Users have MAC filtering is enabled on the wireless access point.
B.
The wireless access point is installed in a wrong location.
C.
A firewall policy at the wireless access point is blocking the access.
D.
Users are sitting far away from the wireless access point.

A

D.
Users are sitting far away from the wireless access point.

The only possible cause of the given choices can be that the users are sitting far away from the wireless access point. The signals are not able to reach them properly and therefore, causing the issue of poor performance. MAC filtering would either allow or disallow a connection. It cannot be the cause of poor performance. If there was a firewall policy enabled, then it will either allow or disallow a connection. Wireless access point installed in a wrong location would have caused an issue for every user, not selective.