Test 2 Study deck Flashcards

1
Q

You run a website called Offhand that sells exclusive handmade home decor items. On Mother’s Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?
a. rapid elasticity
b. measured service
c. broad network access
d. resource pooling

A

rapid elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network?
a. the core layer
b. the aggregation layer
c. the distribution layer
d. the access layer

A

the core layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?
a. broad network access
b. resource pooling
c. rapid elasticity
d. measured service

A

measured service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following protocols can detect and correct link failures in milliseconds?
a. CARP
b. RSTP
c. SPB
d. TRILL

A

RSTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most?
a. a public cloud
b. a community cloud
c. a hybrid cloud
d. a private cloud

A

A community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud?
a. VPN
b. Leased Line
c. Remote access connection
d. Internet

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (spanning tree protocol) features that will block BPDUs (bridge protocol data units) on any port serving network hosts. Which of the following will he use for such purposes?

a. a BDPU guard
b. a root bridge
c. a root guard
d. a BPDU filter

A

A BDPU Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?
a. a layer 3 switch
b. a root port
c. an SDN controller
d. storm control

A

A layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses?
a. TRILL
b. CARP
c. SPB
d. LACP

A

CARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have been working with an ISP as a network engineer. You have made multiple WAN connections over a period of time. Recently, you have received complaints from various clients about network failure, which is having an effect on their day-to-day business. This network failure is primarily caused by some bugs in a few of the network devices. In order to protect your clientele, you have decided to provide an additional information sheet that will specifically state the amount of time you will take to fix the issue. Which of the following will you use to calculate the average amount of time required to repair the faulty device?
a. CARP
b. MTBF
c. LACP
d. MTTR

A

MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations?
a. the management plane
b. the control plane
c. the application plane
d. the infrastructure plane

A

The infrastructure plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following switches can be configured via a command line interface or a web-based management GUI?
a. spine switches
b. an unmanaged switch
c. leaf switches
d. a managed switch

A

A managed switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have been working as the network administrator for JP Steels. In order to cut down on operating costs, you plan to install a firewall’s OS in a VM on an inexpensive server, instead of purchasing an expensive hardware firewall to protect a LAN. Hence, you no longer require a firewall that runs on its own OS. Which of the following firewalls will you purchase in this scenario?
a. a Fortinet firewall device
b. a firewall device by Palo Alto Networks
c. Barracuda’s Cloudgen firewall device
d. a Cisco firewall

A

Barracuda’s cloudgen firewall device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following terms refers to the technique of grouping redundant resources such as servers so they appear as a single device to the rest of the network?
a. Automatic failover
b. load balancing
c. use of hot-swappable parts
d. clustering

A

Automatic failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?
a. IB
b. FC
c. iSCSI
d. FCoE

A

iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows device?
a. clustering
b. load balancing
c. NIC teaming
d. Port aggregation

A

NIC teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?
a. redundancy
b. a load balancer
c. an SDN controller
d. CARP

A

A load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue?
a. A BPDU filter
b. A BPDU guard
c. a root guard
d. storm control

A

Storm Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In which of the following modes will a vNIC access a physical network using the host machine’s NIC?
a. NAT mode
b. host-only mode
c. isolation mode
d. bridged mode

A

Bridged mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) mode. Analyze which of the following options James such present to his client in this scenario.
a. layer 3 switches
b. layer 4 switches
c. EoR switches
d. ToR switches

A

Later 4 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization’s nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?
a. two bits
b. four bits
c. three bits
d. five bits

A

Four bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet’s network ID is 192.168.50.119, what is the targeted subnet’s broadcast address?
a. 192.168.50.0
b. 192.168.50.118
c. 192.168.50.120
d. 192.168.50.255

A

192.168.50.118

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the formula 2^n = Y, what does n represent?
a. it is the number of bits that must be switched from the host address to the network ID
b. It is the number of subnets that result
c. It equals the number of hosts available in each subnet
d. It equals the number of bits remaining in the host portion

A

it is the number of bits that must be switched from the host address to the network ID

24
Q

the part which identifies the network in an IPv4 address is known as _____
a. the network ID
b. the site prefix
c. the VTP
d. the host ID

A

the network ID

25
Q

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?
a. 255.252.0.0
b. 255.254.0.0
c. 255.240.0.0
d. 255.248.0.0

A

255.254.0.0

26
Q

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN transmission belongs to. Which of the following will you use in such a situation?
a. SAID
b. stack master
c. MTU
d. VLAN hopping

A

SAID

27
Q

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack has been experienced in this scenario?
a. switch spoofing
b. incorrect port mode
c. VLAN isolation
d. double tagging

A

switch spoofing

28
Q

Bilmain Manufactures has recruited you as a network administrator to handle the organization’s network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?
a. 255.255.255.255
b. 255.255.0.0
c. 255.255.255.0
d. 255.0.0.0

A

255.0.0.0

29
Q

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?
a. double tagging
b. incorrect port mode
c. incorrect VLAN assignment
d. VLAN isolation

A

incorrect port mode

30
Q

Analyze which of the following can be used to establish a static VLAN assignment for a device.
a. All WLAN traffic grouped within the same VLAN
b. Assigning a VLAN based on the switch port the device is connected to
c. client device information, such as MAC address or location
d. Authentication processes in cooperation with a RADIUS server

A

assigning a VLAN based on the switch port the device is connected to

31
Q

Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting?
a. 191.254.0.32
b. 191.254.0.96
c. 191.54.1.64
d. 191.254.1.29

A

191.254.1.29

32
Q

Phillips is a trainee who is currently on probation at ICP solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?
a. VLANs
b. Departmental boundaries
c. Device types
d. Geographic locations

A

geographic locations

33
Q

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries’ departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?
a. double tagging
b. incorrect port mode
c. VLAN isolation
d. Incorrect VLAN assignment

A

incorrect VLAN assignment

34
Q

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?
a. switchport trunk native vlan
b. set port-mode trunk
c. set native-vlan-id
d. ip dhop snooping

A

switchport trunk native vlan

35
Q

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?
a. 255.255.255.224
b. 255.255.255.248
c. 255.255.255.240
d. 255.255.255.252

A

255.255.255.224

36
Q

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?
a. MTU
b. stack master
c. SAID
d. VLAN hopping

A

stack master

37
Q

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?
a. 32
b. 62
c. 30
d. 64

A

62

38
Q

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?
a. classless addressing
b. VLSM
c. site prefix
d. VTP

A

VLSM

39
Q

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?
a. stack master
b. VLAN hopping
c. MTU
d. SAID

A

SAID

40
Q

Which of the following commands lists a router’s routing table information?
a. show ip route
b. s default-gateway
c. ip default-network
d. ip interface brief

A

show ip route

41
Q

You are working as a technical specialist for an ISP. The network administrator has asked you to setup a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use?
a. RIPv2
b. BGP
c. OSPF
d. EIGRP

A

RIPv2

42
Q

You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available to that the path to the destination can be shortened. Which of the following will help you in doing so?
a. Convergence time
b. routing cost
c. overhead
d. AD

A

routing cost

43
Q

Which of the following is a more intelligent version of an NIU (network interface unit)?
a. modem
b. DTE
c. smartjack
d. DCE

A

smartjack

44
Q

You are employed as a network engineer. While setting up a client’s connection, the client requests you to display trunks configured on a switch. Which of the following commands will you use in this scenario?
a. sh int sw
b. sh ip int br
c. sh int tr
d. sh int

A

sh int tr

45
Q

Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario.
a. Use the privileged EXEC mode to apply the changes
b. use the interface configuration mode to apply the changes
c. use the EXEC mode to apply the changes
d. use the global configuration mode to apply the changes

A

use the privileged EXEC mode to apply the changes

46
Q

Which of the following statements about MPLS (multiprotocol label switching) is not true?
a. MPLS connections are highly scalable for businesses, which means a business can add more and longer connections for less cost than similarly scaled leased lines
b. MPLS does not offer any decreased latency
c. the ability to label traffic offers more reliability, predictability, and security (when properly implemented) than when using cheaper connections over the open Internet.
d. Customers can prioritize their own traffic across the WAN according to QoS attributes, such as giving VoIP traffic higher priority over email traffic

A

MPLS does not offer any decreased latency

47
Q

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administer to determine the best solution to this problem. Which type of routing path will you use to solve this problem?
a. gateway of last resort
b. default route
c. dynamic route
d. static route

A

dynamic route

48
Q

Browski is a company that deals with SD-WAN (software defined wide area network) units. The management of Browski wants to present an audio-video presentation at one of the network exhibitions to demonstrate its new product. As a network administrator working there, you have been asked to go through a few pointers in the presentation to verify the accuracy of the content. Analyze if any of these aspects do not apply to SD-WAN.
a. SD-WAN has zero-touch provisioning
b. SD-WAN provides better intent-based management
c. SD-WAN is transport agnostic
d. SD-WAN can be more expensive than leased lines

A

SD-WAN can be more expensive than leased lines

49
Q

Which of the following IGPs support large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops?
a. OSPF
b. EIGRP
c. BGP
d. IS-IS

A

OSPF

50
Q

LTE (long-term evolution) and LTE-A (LTE advanced) are variations of which generation of cellular network?
a. 5th generation
b. 2nd generation
c. 3rd generation
d. 4th generation

A

4th generation

51
Q

Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer?
a. line driver
b. CSU/DSU
c. DTE
d. NIU

A

CSU/DSU

52
Q

SMCS School has hired you to set up an Internet connection within the school premises. The internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. Which of the following types of network will you install in this scenario?
a. LAN
b. WAN
c. CAN
d. MAN

A

CAN

53
Q

You are working as a network analyzer for an ISP. A client has approached you to set up a network connection for a bank with office around the state. The network needs to connect these offices with each other in order to gather transaction and account information into a central database. Which of the following connections will you provide in this scenario?
a. WAN
b. MAN
c. LAN
d. CAN

A

WAN

54
Q

Which of the following traverses a significant distance and usually supports very high data throughput?
a. MAN
b. CAN
c. LAN
d. WAN

A

WAN

55
Q

Crom Breweries is an old client of HW internet solutions. Crom’s IT department calls HW solutions to inform that the interface is down. HW solutions sends a network analyst to check the situation. The network analyst assumes that an employee must have shut down the interface. He applies the show interface command to get an overview of all the devices interfaces. Analyze which of the following will help the network analyst to know whether the interface was shutdown.
a. link state
b. bandwidth
c. traffic statistics
d. MTU

A

link state

56
Q

A network administrator has asked Robin, a network engineer, to use OSPF (Open shortest path first) along with RIP (routing information protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.
a. Multi vendor routers
b. Low overhead, fast convergence
c. stability
d. shared data

A

low overhead, fast convergence

57
Q

Which of the following refers to any router outside an organization’s AS (autonomous system), such as a router on the Internet backbone?
a. edge router
b. core router
c. routing table
d. exterior router

A

exterior router