You are in the process of configuring an iSCSI storage area network (SAN) for your network…. Which tool should you use? |
iSCSI Initiator |
Arrange the Fibre Channel SAN implementations tasks in the order they should be performed. |
Step 1- Install a Fibre Channel adapter in each server that will access the shared storage on the SAN. Step 2- Deploy a Fibre Channel switch. Step 3- Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using. Step 4- Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives. |
Which of the following does NOT accurately describe an iSCSI SAN? |
Requires special hardware and knowledge to implement. |
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used? |
NAS with Clustering. |
In a SAN implementation, the servers that connect to shared storage devices are called___________________. |
initiators |
Which of the following are typical components of a NAS device? select two |
A minimal network OS. One or more NICs. |
Which of the following protocols are used with VoIP? |
SIP RTP |
Which of the following protocols are used by VoIP to set up, maintain, and terminate a phone call? |
SIP |
Which switch features are typically used with VoIP? |
PoE VLAN |
Which of the following features is used with digital IP phones to supply power through a switch port? |
PoE |
Match each UC component on the left with its corresponding definition on the right. |
UC Server – Manages the entire UC system UC Gateway – Connects a digital network to an analog network UC Server – Makes presence information available to users UC Hardware Device – An IP phone for making phone calls UC Gateway – Connects a UC network to the PSTN UC Software Device – A smart phone used to access the UC system UC Hardware Device – Designed to work specifically with the UC server |
Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system? |
Jitter |
At what percent is packet loss noticeable in voice traffic? |
1% |
Which protocol doies VoIP use to interface with the PSTN? |
MGCP |
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. |
Presence information |
You’ve been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them? |
Unified communication |
Which of the following protocols is used during the call control process of multimedia communications? |
Session Initiation Protocol |
In virtualization, what is the role of a hypervisor? |
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. |
What type of virtualization completely simulates a real physical host? |
Full Virtualization |
Which component is most likely to allow physical and virtual machines to communicate with each other? |
Virtual switch |
Which of the following are advantages of virtualization? select two |
Centralized administration Easy migration of systems to different hardware |
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? |
Virtual servers. |
You have configured a virtual network that includes the following virtual components: |
Virtual OS 2 Virtual OS 3 |
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? |
Virtual servers |
You have configured a virtual network that includes the following virtual components: |
Virtual OS 3 Physical OS 1 Physical OS 2 Physical OS 3 Physical OS 4 |
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? |
Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. |
Match the virtualization feature on the right with the appropriate description on the left. |
Flexibility – Moving virtual machines between hypervisor hosts Testing – Verifying that security controls are working as designed Server consolidation – Performing a physical-to-virtual migration (P2V) Sandboxing – Isolating a virtual machine from the physical network |
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. |
Create a new virtual switch configured for bridged (external) networking Connect the virtual network interfaces in the virtual machine to the virtual switch |
What key advantage does a virtual router have over a physical router? |
Multiple networks can be connected to a single interface. |
You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? |
Implement a virtual firewall within the hypervisor. |
Which of the following statements about virtual NICs are true? |
Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine. |
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network? |
SaaS |
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model? |
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure |
Which of the following is NOT true regarding cloud computing? |
Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services. |
Public cloud |
Provides cloud services to just about anyone |
Private cloud |
Provides cloud services to a single organization |
Community cloud |
Allows cloud services to be shared by several organizations |
Hybrid Cloud |
Integrates one cloud service with other cloud services |
You were hired by a small start-up company. the company is in a small office and has several remote employees. |
IaaS |
You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? |
Verify that your network’s existing security infrastrucutre is working properly. Install the latest firmware updates from the device manufacturer |
You manage the information systems for a large manufacturing firm. Supervisory control and data acquistion (SCADA) devices are used on the manfucaturing floor to manager your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? |
Install the latest firmware updates from the device manufacturer Verify that your network’s existing security infrastrucutre is working properly. |
Why do attackers prefer static environment devices to conduct distributed network attacks? select two |
These devices tend to employ much weaker security than traditional network devices These devices are typically more difficult to monitor than traditional network devices. |
Match the definition on the left with the SCADA technology term on the right |
Remote Terminal Unit- Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process. DCS- A network of components that work together in order to remotely manage industrial equipment. Network Link- Connects the supervisory computer to the RTUs or PLCs. Supervisory Computer-Communicates with and send control commands to connected SCADA devices. Programmable logic Controller- Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process |
Which of the following is an example of smart technology embedded within networked devices associated with automated factory equipment? |
SCADA systems |
SCADA systems are typically implemented using which of the following components? |
Remote terminal units (RTUs), and programmable Logic Controllers (PLCs) |
What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment? |
They are vulnerable to exploits due to weaker security. |
Network Pro chapter 9 9.1.9 Practice exam , Ch 9.2, 9.3.4 Practice exam, 9.4.6Practice exam, 9.5.3 Practice Exam, 9.6.3 Practice exam
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price