Test 2 Study deck Flashcards
You run a website called Offhand that sells exclusive handmade home decor items. On Mother’s Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?
a. rapid elasticity
b. measured service
c. broad network access
d. resource pooling
rapid elasticity
You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network?
a. the core layer
b. the aggregation layer
c. the distribution layer
d. the access layer
the core layer
Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?
a. broad network access
b. resource pooling
c. rapid elasticity
d. measured service
measured service
Which of the following protocols can detect and correct link failures in milliseconds?
a. CARP
b. RSTP
c. SPB
d. TRILL
RSTP
The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most?
a. a public cloud
b. a community cloud
c. a hybrid cloud
d. a private cloud
A community cloud
Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud?
a. VPN
b. Leased Line
c. Remote access connection
d. Internet
Internet
Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (spanning tree protocol) features that will block BPDUs (bridge protocol data units) on any port serving network hosts. Which of the following will he use for such purposes?
a. a BDPU guard
b. a root bridge
c. a root guard
d. a BPDU filter
A BDPU Guard
Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?
a. a layer 3 switch
b. a root port
c. an SDN controller
d. storm control
A layer 3 switch
Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses?
a. TRILL
b. CARP
c. SPB
d. LACP
CARP
You have been working with an ISP as a network engineer. You have made multiple WAN connections over a period of time. Recently, you have received complaints from various clients about network failure, which is having an effect on their day-to-day business. This network failure is primarily caused by some bugs in a few of the network devices. In order to protect your clientele, you have decided to provide an additional information sheet that will specifically state the amount of time you will take to fix the issue. Which of the following will you use to calculate the average amount of time required to repair the faulty device?
a. CARP
b. MTBF
c. LACP
d. MTTR
MTTR
Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations?
a. the management plane
b. the control plane
c. the application plane
d. the infrastructure plane
The infrastructure plane
which of the following switches can be configured via a command line interface or a web-based management GUI?
a. spine switches
b. an unmanaged switch
c. leaf switches
d. a managed switch
A managed switch
You have been working as the network administrator for JP Steels. In order to cut down on operating costs, you plan to install a firewall’s OS in a VM on an inexpensive server, instead of purchasing an expensive hardware firewall to protect a LAN. Hence, you no longer require a firewall that runs on its own OS. Which of the following firewalls will you purchase in this scenario?
a. a Fortinet firewall device
b. a firewall device by Palo Alto Networks
c. Barracuda’s Cloudgen firewall device
d. a Cisco firewall
Barracuda’s cloudgen firewall device
Which of the following terms refers to the technique of grouping redundant resources such as servers so they appear as a single device to the rest of the network?
a. Automatic failover
b. load balancing
c. use of hot-swappable parts
d. clustering
Automatic failover
Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?
a. IB
b. FC
c. iSCSI
d. FCoE
iSCSI
As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows device?
a. clustering
b. load balancing
c. NIC teaming
d. Port aggregation
NIC teaming
Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?
a. redundancy
b. a load balancer
c. an SDN controller
d. CARP
A load balancer
Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue?
a. A BPDU filter
b. A BPDU guard
c. a root guard
d. storm control
Storm Control
In which of the following modes will a vNIC access a physical network using the host machine’s NIC?
a. NAT mode
b. host-only mode
c. isolation mode
d. bridged mode
Bridged mode
James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) mode. Analyze which of the following options James such present to his client in this scenario.
a. layer 3 switches
b. layer 4 switches
c. EoR switches
d. ToR switches
Later 4 switches
You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization’s nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?
a. two bits
b. four bits
c. three bits
d. five bits
Four bits
You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet’s network ID is 192.168.50.119, what is the targeted subnet’s broadcast address?
a. 192.168.50.0
b. 192.168.50.118
c. 192.168.50.120
d. 192.168.50.255
192.168.50.118