deck_14603881 Flashcards

(57 cards)

1
Q

You run a website called Offhand that sells exclusive handmade home decor items. On Mother’s Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?a. rapid elasticityb. measured servicec. broad network accessd. resource pooling

A

rapid elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network?a. the core layerb. the aggregation layerc. the distribution layerd. the access layer

A

the core layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?a. broad network accessb. resource poolingc. rapid elasticityd. measured service

A

measured service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following protocols can detect and correct link failures in milliseconds?a. CARPb. RSTPc. SPBd. TRILL

A

RSTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most?a. a public cloudb. a community cloudc. a hybrid cloudd. a private cloud

A

A community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud?a. VPNb. Leased Linec. Remote access connectiond. Internet

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (spanning tree protocol) features that will block BPDUs (bridge protocol data units) on any port serving network hosts. Which of the following will he use for such purposes?a. a BDPU guardb. a root bridgec. a root guardd. a BPDU filter

A

A BDPU Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?a. a layer 3 switchb. a root portc. an SDN controllerd. storm control

A

A layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses?a. TRILLb. CARPc. SPBd. LACP

A

CARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have been working with an ISP as a network engineer. You have made multiple WAN connections over a period of time. Recently, you have received complaints from various clients about network failure, which is having an effect on their day-to-day business. This network failure is primarily caused by some bugs in a few of the network devices. In order to protect your clientele, you have decided to provide an additional information sheet that will specifically state the amount of time you will take to fix the issue. Which of the following will you use to calculate the average amount of time required to repair the faulty device?a. CARPb. MTBFc. LACPd. MTTR

A

MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations?a. the management planeb. the control planec. the application planed. the infrastructure plane

A

The infrastructure plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following switches can be configured via a command line interface or a web-based management GUI?a. spine switchesb. an unmanaged switchc. leaf switchesd. a managed switch

A

A managed switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have been working as the network administrator for JP Steels. In order to cut down on operating costs, you plan to install a firewall’s OS in a VM on an inexpensive server, instead of purchasing an expensive hardware firewall to protect a LAN. Hence, you no longer require a firewall that runs on its own OS. Which of the following firewalls will you purchase in this scenario?a. a Fortinet firewall deviceb. a firewall device by Palo Alto Networksc. Barracuda’s Cloudgen firewall deviced. a Cisco firewall

A

Barracuda’s cloudgen firewall device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following terms refers to the technique of grouping redundant resources such as servers so they appear as a single device to the rest of the network?a. Automatic failoverb. load balancingc. use of hot-swappable partsd. clustering

A

Automatic failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?a. IBb. FCc. iSCSId. FCoE

A

iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows device? a. clusteringb. load balancing c. NIC teamingd. Port aggregation

A

NIC teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?a. redundancyb. a load balancerc. an SDN controllerd. CARP

A

A load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue?a. A BPDU filterb. A BPDU guardc. a root guardd. storm control

A

Storm Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In which of the following modes will a vNIC access a physical network using the host machine’s NIC? a. NAT modeb. host-only modec. isolation moded. bridged mode

A

Bridged mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) mode. Analyze which of the following options James such present to his client in this scenario. a. layer 3 switchesb. layer 4 switchesc. EoR switchesd. ToR switches

A

Later 4 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization’s nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?a. two bitsb. four bitsc. three bitsd. five bits

A

Four bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet’s network ID is 192.168.50.119, what is the targeted subnet’s broadcast address?a. 192.168.50.0b. 192.168.50.118c. 192.168.50.120d. 192.168.50.255

A

192.168.50.118

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the formula 2^n = Y, what does n represent?a. it is the number of bits that must be switched from the host address to the network IDb. It is the number of subnets that resultc. It equals the number of hosts available in each subnetd. It equals the number of bits remaining in the host portion

A

it is the number of bits that must be switched from the host address to the network ID

24
Q

the part which identifies the network in an IPv4 address is known as _____a. the network IDb. the site prefixc. the VTPd. the host ID

A

the network ID

25
The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?a. 255.252.0.0b. 255.254.0.0c. 255.240.0.0d. 255.248.0.0
255.254.0.0
26
You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN transmission belongs to. Which of the following will you use in such a situation?a. SAIDb. stack masterc. MTUd. VLAN hopping
SAID
27
An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack has been experienced in this scenario?a. switch spoofingb. incorrect port modec. VLAN isolationd. double tagging
switch spoofing
28
Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?a. 255.255.255.255b. 255.255.0.0c. 255.255.255.0d. 255.0.0.0
255.0.0.0
29
Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?a. double taggingb. incorrect port modec. incorrect VLAN assignmentd. VLAN isolation
incorrect port mode
30
Analyze which of the following can be used to establish a static VLAN assignment for a device.a. All WLAN traffic grouped within the same VLANb. Assigning a VLAN based on the switch port thee device is connected toc. client device information, such as MAC address or locationd. Authentication processes in cooperation with a RADIUS server
assigning a VLAN based on the switch port the device is connected to
31
Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting?a. 191.254.0.32b. 191.254.0.96c. 191.54.1.64d. 191.254.1.29
191.254.1.29
32
Phillips is a trainee who is currently on probation at ICP solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?a. VLANsb. Departmental boundariesc. Device typesd. Geographic locations
geographic locations
33
Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?a. double taggingb. incorrect port modec. VLAN isolationd. Incorrect VLAN assignment
incorrect VLAN assignment
34
You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Sisco switch?a. switchport trunk native vlanb. set port-mode trunkc. set native-vlan-idd. ip dhop snooping
switchport trunk native vlan
35
You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?a. 255.255.255.224b. 255.255.255.248c. 255.255.255.240d. 255.255.255.252
255.255.255.224
36
You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?a. MTUb. stack masterc. SAIDd. VLAN hopping
stack master
37
You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?a. 32b. 62c. 30d. 64
62
38
Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?a. classless addressingb. VLSMc. site prefixd. VTP
VLSM
39
You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?a. stack masterb. VLAN hoppingc. MTUd. SAID
SAID
40
Which of the following commands lists a router's routing table information?a. show ip routeb. s default-gatewayc. ip default-networkd. ip interface brief
show ip route
41
You are working as a technical specialist for an ISP. The network administrator has asked you to setup a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use?a. RIPv2b. BGPc. OSPFd. EIGRP
RIPv2
42
You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available to that the path to the destination can be shortened. Which of the following will help you in doing so?a. Convergence timeb. routing coastc. overheadd. AD
routing cost
43
Which of the following is a more intelligent version of an NIU (network interface unit)?a. modemb. DTEc. smartjackd. DCE
smartjack
44
You are employed as a network engineer. While setting up a client's connection, the client requests you to display trunks configured on a switch. Which of the following commands will you use in this scenario?a. sh int swb. sh ip int brc. sh int trd. sh int
sh int tr
45
Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario.a. Use the privileged EXEC mode to apply the changesb. use the interface configuration mode to apply the changesc. use the EXEC mode to apply the changesd. use the global configuration mode to apply the changes
use the privileged EXEC mode to apply the changes
46
Which of the following statements about MPLS (multiprotocol label switching) is not true?a. MPLS connections are highly scalable for businesses, which means a business can add more and longer connections for less cost than similarly scaled leased linesb. MPLS does not offer any decreased latencyc. the ability to label traffic offers more reliability, predictability, and security (when properly implemented) than when using cheaper connections over the open Internet.d. Customers can prioritize their own traffic across the WAN according to QoS attributes, such as giving VoIP traffic higher priority over email traffic
MPLS does not offer any decreased latency
47
Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administer to determine the best solution to this problem. Which type of routing path will you use to solve this problem?a. gateway of last resortb. default routec. dynamic routed. static route
dynamic route
48
Browski is a company that deals with SD-WAN (software defined wide area network) units. The management of Browski wants to present an audio-video presentation at one of the network exhibitions to demonstrate its new product. As a network administrator working there, you have been asked to go through a few pointers in the presentation to verify the accuracy of the content. Analyze if any of these aspects do not apply to SD-WAN.a. SD-WAN has zero-touch provisioningb. SD-WAN provides better intent-based managementc. SD-WAN is transport agnosticd. SD-WAN can be more expensive than leased lines
SD-WAN can be more expensive than leased lines
49
Which of the following IGPs support large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops?a. OSPFb. EIGRPc. BGPd. IS-IS
OSPF
50
LTE (long-term evolution) and LTE-A (LTE advanced) are variations of which generation of cellular network?a. 5th generationb. 2nd generationc. 3rd generationd. 4th generation
4th generation
51
Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer?a. line driverb. CSU/DSUc. DTEd. NIU
CSU/DSU
52
SMCS School has hired you to set up an Internet connection within the school premises. The internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. Which of the following types of network will you install in this scenario?a. LANb. WANc. CANd. MAN
CAN
53
You are working as a network analyzer for an ISP. A client has approached you to set up a network connection for a bank with office around the state. The network needs to connect these offices with each other in order to gather transaction and account information into a central database. Which of the following connections will you provide in this scenario?a. WANb. MANc. LANd. CAN
WAN
54
Which of the following traverses a significant distance and usually supports very high data throughput?a. MANb. CANc. LANd. WAN
WAN
55
Crom Breweries is an old client of HW internet solutions. Crom's IT department calls HW solutions to inform that the interface is down. HW solutions sends a network analyst to check the situation. The network analyst assumes that an employee must have shut down the interface. He applies the show interface command to get an overview of all the devices interfaces. Analyze which of the following will help the network analyst to know whether the interface was shutdown.a. link stateb. bandwidthc. traffic statisticsd. MTU
link state
56
A network administrator has asked Robin, a network engineer, to use OSPF (Open shortest path first) along with RIP (routing information protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.a. Multi vendor routersb. Low overhead, fast convergencec. stabilityd. shared data
low overhead, fast convergence
57
Which of the following refers to any router outside an organization's AS (autonomous system), such as a router on the Internet backbone?a. edge routerb. core routerc. routing tabled. exterior router
exterior router