Testout

Cache web pages, Block employees from accessing certain websites

Which of the following functions are performed by proxies?

Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance.

Install a proxy server

Which of the following allows you to save frequently-accessed websites on your local network for later retrieval?

Proxy

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

How does a proxy server differ from a packet filtering firewall?

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.

Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?

Switch

Which network component connects a device with the transmission media and allows it to send and receive messages?

Network interface card

Which of the following hardware devices links multiple networks and directs traffic between networks?

Router

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?

Hub

What device sends signals from a computer onto a network?

Transceiver

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub, Repeater

Which of the following statements accurately describes how a modem works?

It demodulates analog data from a telephone network into digital PC data. It modulates digital data from the PC into analog data and transmits it on a telephone network.

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header.

Which of the following is a firewall function?

Packet filtering

As a security precaution, you have implemented IPsec that is used between any two devices on your network. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.

Host-based IDS

What security mechanism can be used to detect attacks originating on the Internet or from within an internal, trusted subnet?

IDS

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

Firewall

What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack?

An alert is generated and delivered via e-mail, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

Which of the following activities are considered passive in regards to the functioning of an intrusion detection system?

Listening to network traffic, Monitoring the audit trails on a server

An active IDS system often performs which of the following actions?

Update filters to block suspect traffic, Perform reverse lookups to identify an intruder

Which of the following prevents access based on website ratings and classifications?

Content filter

What does an IDS that uses signature recognition use for identifying attacks?

Comparison to a database of known attacks

Which of the following is the most common detection method used by an IDS?

Signature

You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Update the signature files

Which of the following devices can monitor a network and detect potential security attacks?

IDS

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

Which of the following are security devices that perform stateful inspection of packet data, looking for patterns that indicate malicious code?

IDS, IPS

You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization?

Enforcement of the organization's Internet usage policy, An increase in bandwidth availability

Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. what step must be taken to ensure that the information is useful in maintaining a secure environment?

Periodic reviews must be conducted to detect malicious activity or policy violations.

Which of the following devices is capable of detecting and responding to security threats?

IPS

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want to take immediate action when possible to stop or prevent the attack. Which tool should you use?

IPS

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out to ports 2-8.

Which of the following devices does not segment the network?

Hub

Which of the following devices is capable of performing routing of IP packets at wire speeds using an ASIC module instead of the CPU or software?

Layer 3 switch

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static Web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your Web content. The device should not be able to distribute requests between the various Web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions.

Content Switch

Drag the broadcast domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.

Hub
Unmanaged switch
802.11n wireless access point
Router
Bridge
Repeater
Layer 3 Switch

Single broadcast domain Single broadcast domain Single broadcast domain Multiple broadcast domains Single broadcast domain Single broadcast domain Multiple broadcast domains

You manage a server that runs your company website. The website includes streaming video that shows features of some of your products. The link connecting your server to the Internet charges based on bandwidth use. when the bandwidth spikes, so does your bill. You would like to implement a solution to prevent the amount of traffic sent over the WAN link from exceeding a specific level. Which solution should you implement?

Traffic shaper

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and provide for future growth?

Switch

Which of the following devices can monitor a network and detect potential security attacks?

IDS

which of the following devices is capable of detecting and responding to security threats?

IPS

What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?

IDS

What actions can a typical passive intrusion Detection System (IDS) take when it detects an attack? (Select two.)

An alert is generated and delivered via Email, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?

IPS

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for a traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?

Host based IDS

What IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database

Signature based

You are concerned about protecting your network from network-based attack from the Internet. Specifically, you are concerned about zero-day attacks (attacks that have not yet been identified or that do not have prescribed protections.) Which type of device should you use?

Anomaly based IDS

You have a Web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement?

Load balancing

You manage a server that runs your company website. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that a second server can respond to requests for website content. Which solution should you implement?

Load balancin

You are concerned about protecting your network from network-based attacks from the Internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Anomaly based IDS

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration (Select two.)

Configure the browser to send HTTPS requests through the VPN connection, Configure the VPN connection to use IPsec

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)

RADIUS, TACACS+

You have decided to implement a remote access solution that uses multiple remote access servers. you want to implement RADIUS to centralize remove access authentication and authorization. Which of the following would be a required part of your configuration?

Configure remote access servers as RADIUS clients.

Which of the following are characteristics of TACACS+ (Select two.)

Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting.

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to split between different servers.

Which of the following protocols can be used to centralize remote access authentication?

TACACS

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. what service should you implement?

RAS

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

You are configuring your computer to dial up to the Internet. What protocol should you use?

PPP

Which of the following protocols or services is commonly used on cable Internet connections for user authentication?

PPPoE

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?

Remote access

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the Internet? (select two.)

PPTP, L2TP

IPsec is implemented through two separate protocols. What are these protocols called? (Selected two.)

ESP, AH

Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?

IPsec

You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?

PPPoE

RADIUS is primarily used for what purpose?

Authenticating remote clients before access to the network is granted.

Which of the following is a characteristics of TACAS+

Encrypts the entire packet, not just the authentication packets

Which of the following ports are used with TACAS?

49

Which of the following statements about SSL VPN are true? (Select two.)

encrypts the entire communication session, uses port 443

Which of the following can route layer 3 protocols across an IP network?

GRE

Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. Which unified communication feature is this?

Presence information

You've been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them?

Unified communication

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?

Port forwarding

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use?

DNS Server

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?

DNS

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a windows XP client system and using the ipconfig command, receive the following information

Ethernet adapter Local Area Connection 1:
Description . . . . . . . . . . : CardBus-I 10/100 PC Card
Physical Address . . . . . . . : 02-00-4C-4F-3F-50
DHCP Enabled . . . . . . . . . . . : Yes
Autoconfiguration enabled . . . . . . Yes
Autoconfiguration IP Address . . . . . . . :169.254.25.129
Subnet Mask . . . . . . . . . . . 255.255.0.0
Default Gateway . . . . . . . . :
DNS Servers . . . . . . . . :

Which of the following statements are true? (Select two).

The client system is configured to use DHCP, the client system is unable to reach the DHCP server.

You have configured your organizations dHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days.
A user's workstation is powered on and receives addressing information from this DHCP server Monday morning at 8:00AM.
When will the client contact the DHCP server to renew the lease (by default)?

Wednesday Morning

Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?

A DHCP server assigns addresses to requesting hosts. It can deliver other configuration information in addition to IP addresses.

Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (select two.)

Install a DHCP server on the network. Use Automatic Private IP Addressing

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?

DHCP Server

You are implementing a DHCP server for your segment. Your Segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on youe DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem?

You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06)

Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to addres 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure?

The clients must be configured to obtain IP addressing from a DHCP server.

You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 89, and Macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output:

0 ethernet adapter:
IP address . . . . . . . . . : 169.254.1.17
Subnet Mask . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . :

You also check your NIC and see the link light on.
what might the problem be?

Unavailable DHCP server

Which of the following functions are performed by proxies? (Select two.)

Cache web pages, block employees from accessing certain websites

You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem?

A proxy server is blocking access to the websites

Which fo the following solutions would you implement to track which websites network users are accessing?

Proxy

You would like to control Internet access based on users, time of day, and websites visited. How can you do this?

Install a proxy server. Allow Internet access only through the proxy server.

You manage a server that runs your company website. The web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content.

Proxy Server

Which of the following are true of a circuit proxy filter firewall (Select two.)

Operates at the Session layer. Verifies sequencing of session packets.

Which of the following are true about reverse proxy? (Select two.)

Can perform load balancing, authentication, and caching. Handles requests from the Internet to a server in a private network.

Listed below are several DNS record types. Match the record type on the left with its function on the right.

Drag: A, CNAME. MX. PTR. AAAA

Drop: Points a hostname to an IPv4 address
Provides alternate names to hosts that already have a host record.
Points an IP address to a hostname.
Points a hostname to an IPv6 address
Identifies servers that can be used to deliver mail.

A, CNAME, PTR, AAAA, MX

You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router.
Which of the following would be the best action to take in order to fix the problem?

Implement an IP Helper address on the router.

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?

Specify which server network interface the agent listens on for DHCP messages.

Which of the following services automatically creates and deletes host records when an IP address lease is created or released?

Dynamic DNS

If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? (Select two.)

The ipconfig /release command is entered on a workstation. The DHCP server renews an IP address lease.

You have a WIndows Server 2012 system that you want to use as a DHCP Relay Agent. Which Windows Server 2012 service would you use to do this?

Routing and Remote Access

You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1
Which of the following commands would be used to configure the router?

ip helper-address 172.16.30.1

Based on the diagram, which type of proxy server is handling the client's request?

Client ----> Internet ----> Proxy ----> Server 1

Proxy and Server 1 are an internal network

Reverse Proxy

You have installed an ISDN connection into your home so you can connect to the Internet and talk on the phone at the same time. While you are talking on the telephone, what is the maximum data rate of your internet connection?

ISDN supports 128Kbps total

64Kbps

What is the speed of an OC-3 connection

OC-1= 51.84 Mbps

155.52mbps

Which two of the following describe the channels and data transfer rates used for ISDN BRI?

One D channel operating at 16Kbps Two B channels operating at 64 Kbps each

Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?

ISDN BRI

Which three of the following are advantages of ISDN BRI

It uses existing telephone lines for digital data transmission. It can be used to transmit multiple data types on the same line (data, voice, video, and so on). It has faster connect times than traditional dial-up access.

Which three of the following are characteristics of ISDN?

It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop. It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines.

If the SONET (OC-1) based data rate is 51.84Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second

622.08Mbps

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly?

Wireless

You are moving to an area where DSL will be available in the next six moths. Which method of Internet connectivity should you implement until DSL is available, if your existing connectivity needs are minimal?

PSTN

Which of the following is most susceptible to interference related to atmospheric conditions?

Satellite

To access the Internet through the PSTN, what kind of connectivity device must you use?

Modem

Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber optic networking?

SONET

Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?

MPLS

Which of the following are characteristics of MPLS? (Select two.)

Supports variable-length data units, Adds labels to data units

Which of the following are characteristics of ATM (Select two.)

Adds labels to data units, Uses fixed-length cells of 53-bytes

Which of the following are characteristics of SONET? (Select two.)

Transport protocol used for other traffic types (such as ATM) Dual counter-rotating fiber optic rings

Which of the following describes the lines used in the local loop for dial-up telephone access?

POTS

Which of the following terms identifies the network of dial-up telephone and long-distance lines?

PSTN

Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)

ISDN BRI, ADSL

Which four of the following are the responsibility of the WAN service provider

DCE, CO, PSE, Local loop

Which network type divides transmitted data into smaller pieces and allows for multiple communications on the network medium?

Packet-switched

Which network type establishes a dedicated physical connection between two hosts in order to transmit time-sensitive data?

Circuit-switched

Which of the following WAN technologies provides packet switching over high-quality digital liens at speeds greater than 1.544 Mbps

Frame Relay

Which WAN connection types use digital communications over public telephone lines? (Select two.)

DSL, ISDN

Which of the following correct describes the T1 carrier system? (Select two.)

A single T1 channel can transfer data at 64 Kbps T1 lines use two pairs of copper wire

Which of the following WAN technologies is a dial-up only service?

ISDN BRI

You are implementing Internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20-30 Mbps. Which type of service should you implement

T3

When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites?

Packets

Which networking technology creates virtual links between two remote network endpoints by prefixing packets with a header containing one or more labels?

MPLS

Which of the following is true of Multiprotocol Label Switching? (Select two.)

It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.

Which of the following is true of Multiprotocol Label Switching? (Select two.)

MLPS is designed to work with many different protocols. MPLS-enabled routers switch packets based on the label information, not the packet contents.

What is the maximum data rate of an ISDN BRI line?

128Kbps

Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)

Two B channels operating at 64 Kbps each, One D channel operating at 16 Kbps

Which of the following are characteristics of ISDN? (Select three.)

It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop.

Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?

DSL

Which of the following services are available regardless of whether the telephone company network is available?

Cable modem

You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

Which WAN connection types use digital communications over POTS? (Select two.)

ISDN, DSL

Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?

PPP

RouterA is connected to RouterB through Serial 1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which sent of commands would you use on RouterA to complete the configuration?

A. RouterA(config)#username RouterB password cisco
RouterA (config)#int s1
RouterA(config-if)#encap ppp
RouterA(config-if)#ppp auth chap

B.
RouterA(config)#int s1
RouterA(config-if)#encap ppp
RouterA(config-if)#ppp auth chap
RouterA(config-if)#ppp chap username RouterB password cisco

C.
RouterA(config)#int s1
RouterA(config-if)#encap ppp
RouterA(config-if)#ppp chap username RouterA password cisco

A

Which of the following statements about the functionality of LCP are true? (Select three.)

Data can be compressed at the source and decompressed at the destination. LCP provides multilink support. Usernames and passwords may be required during the handshake.

Which of the following are benefits of LCP? (Select three.)

Monitors data dropped on the link and avoids frame looping. Provides load balancing across multiple links. Negotiates the use (or lack) of authentication before starting the session.

What is the connection order used by two TCP/IP routers to open a session with PPP including authentication?

1 authentication
2 NCP
3 LCP

LCP, authentication, NCP

PPP supports authentication, compression, and multiple Network-layer protocols.
Which of the following correctly sequences these functions when a PPP link is established?

1 Negotiate compression Settings
2 Negotiate Network-layer protocols
3 Perform authentication

Negotiate compression Settings, Perform authentication, Negotiate Network-layer protocols

Which of the following protocols is used by PPP to enable support for multiple Network-layer protocols?

NCP

Which of the following Internet services provides equal upload and download bandwidth?

SDSL

Which of the following are characteristics of VDSL? (Select two.)

Unequal download and upload speeds, Supports both data and voice at the same time

Which of the following is a characteristic of SDSL?

Supports data traffic only( no voice)

Which of the following technologies does GSM use to allow multiple connections on the same frequency?

Time division multiple access

Which of the following cellular network types does not provide Internet connectivity?

4G, LTE, 2G, EDGE, HSPA+

2G

Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.)

HSPA+, LTE

Drag the cellular network specification on the left to its corresponding mobile technology generation on the right.

Drag:
LTE, GSM, WiMAX, HSPA+, CDMA

Drop:
2G:__,__
3G:__,__
4G:__,__

2G: GSM, CDMA 3G: LTE, HSPA+ 4G: WiMAX

Which of the following describe the EDGE cellular technology? (Select two.)

Offers speeds of 400-1000Kbps, The first internet compatible technology

Which of the following geographic network types are typically managed by a city as a public utility?

Metropolitan Area Network (MAN)

Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are sever kilometers apart?

Single mode

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.)

Greater cable distances without a repeater, Immunity to electromagnetic interference

Which pins in an RJ45 connetor are used to transmit data when used on a 100BaseT Ethernet network? (Select two.)

Pin 1: Tx+
Pin 2: Tx-
Pin 3: Rx+
Pin 4: Unused
Pin 5: Unused
Pin 6: Rx-
Pin 7: Unused
Pin 8: Unused

Pin 1, Pin 2

You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of CAtegory 3 network cable in storage. Upon investigation it appears very similar to Category 5 wiring. Should you use Category 3 cabling as a substitute for Category 5 cabling to finish the project?

No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates.

Which of the following are characteristics of coaxial network cable? (choose three.)

The ends of the cable must be terminated, It has a conductor made from copper in the center of the cable, It uses two concentric metallic conductors.

Which of the following is true about single mode fiber optic network cabling?

The central core is smaller than that of multimode fiber optic cabling.

What is the minimum cable specification that supports 1000Mbps Ethernet?

Cat 5e

Which of the following cable types often includes a solid plastic core?

Cat 6

Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? (Select two.)

RG-6, RG-59

You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can't find any RG-6 cable. Which cable types could you use instead?

RG-8 and RG-58 have an impedance rating of 50 ohms
RG-59 and RG-6 have an impedance rating of 75 ohms

RG-59

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum

Of the following cables, which offer the best protection against EMI?

Cat 5, RG-6, Single mode fiber optic, Cat 5e

Single mode fiber optic

Of the following cables, which offer the best protection against EMI?

RG-6, Cat 6e, Cat 5, Cat5e

RG-6

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Crossover

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

Crossover

You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?

Crossover

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?

Straight-through

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?

Rollover

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BasTX switch ports. Which device should you use?

Media converter

At which OSI model layer does a media converter operate?

Layer 1

What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two.)

GBIC, SFP

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-type

Which of the following connectors usually require polishing as part of the assembly process? (select two.)

SC, ST

Which of the following connectors is used with Ethernet 10BaseT networks?

RJ-45

In which of the following situations might you use an RJ-11 connector?

You want to connect the 10BaseT network card in your computer to a switch

You want to connect your computer to the internet with a dial-up connection

You want to upgrade your 10BaseT to 100BaseT

You want to connect your computer to the internet with a dial-up connection

Which of the following are characteristics of an LC fiber optic connector? (choose two.)

They use a housing and latch system similar to an RJ-45 UTP connector. They are half the size of standard connectors.

Which of the following are characteristics of an MT-RJ fiber optic connector? (select two.)

They use metal guide pins to ensure accurate alignment. They can be used with multimode fiber optic cables.

You want to use the T568A standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?

White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

Which of the following connectors is used with fiber optic cables and connects using a twisting motion?

ST

Which of the following connectors are used with fiber optic cables andi nclude both cables in a single connector? (Select two.)

LC, MT-RJ

Which of the following connectors is typically used on one end of a rollover cable?

Serial

When would you typically use an RJ-11 connector?

When connecting a phone to a phone line.

Which of the following standards is typically used in a rollover cable?

RS-232

F-type connectors are typically used with cables using which of the following standards? (select two.)

RG-6, RG-59

Which of the following uses metal clips placed over plastic slots for connecting individual copper wires?

110 block

When using 110 blocks for connecting Cat5 and higher data cables, which recommendation should you follow?

Keep wire pairs twisted up to within one-half of an inch of the connector.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?

Crimping tool

What tool should you use to extend network services beyond the demarc?

Punchdown tool

You are making Ethernet drop cables using Cat5e and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use?

Cable stripper

You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. Which tool should you use?

Punchdown tool

Which of the following tests can be performed by a TDR? (Select two.)

Identify the location of a fault on a cable. Measure the length of a cable.

You are working with an existing fiber optic installation in your building. You want to know how long each length of a cable is that runs through the walls. Which tool should you use?

OTDR

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?

TDR

You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time, which of the following should you do?

Point the cut side of the tool towards the wire end. Use a punchdown tool with a notched blade.

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100Mbps. Which tool should you use to test the drop cable and the connection to the network?

Certifier

You've connected a cable certifier to an RJ45 walljack, and the output shown below is displayed on the device. What does this output indicate? (Select two.)

1 - 3
2 - 6
3 - 1
4 - 7
5 - 8
6 - 2
7 - 4
8 - 5

This is a crossover cable The cable is functioning correctly.

You've connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. what does this output indicate?

1 x 1
2 x 2
3 - 3
4 - 4
5 - 5
6 - 6
7 - 7
8 - 8

Pins 1 and 2 are shorted

You've connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. What does this output indicate? (Select two.)

1 - 1
2 - 2
3 - 3
4 4
5 - 5
6 6
7 - 7
8 - 8

Pin 4 is open, Pin 6 is open

You're responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference (EMI) Which type of cabling would operate best in this environment? (Choose two.)

Fiber-optic cable, shielded twisted pair cable

Which of the following connector types would you most likely use to connect to a T1 WAN service?

RJ48c

You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter?

BNC

Which of the following connector types are used with UTP cables? (Select two.)

RJ-45, RJ-11

Match cable heads in Testout question 211 B.2 Network+ Domainm 1: Network Architecture, All Questions

DB-25, DB-9, RJ-45, RJ-11, LC, BNC< F-Type

You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable

Angled Physical Contact polish

Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type?

Angled Physical Contact

You have a network that sues a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reached the destination device.

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network

Which of the following topologies connects all devices to a trunk cable?

Bus

Which of the following topologies connects each device to a neighboring device?

Ring

In which of the following topologies does each device on the network act as a repeater,s ending the signal to the next device?

Ring

Which of the following topologies connects each network device to a central hub?

Star

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?

Mesh

What device is used to create a physical star topology?

Switch

You have a small network that uses a hub to connect multiple devices. What physical topology is used?

Star

You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link. What type of connection is being used?

Point-to-point

You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites. What type of connection is being used?

Point-to-multipoint

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following describes what happens to the network communications?

No devices will be able to communicate

You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications?

All devices except the device connected with the drop cable will be able to communicate

You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications?

Device A will be able to communicate with all other devices.

You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?

Peer-to-peer

You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have?

Client-server

Which of the following physical topologies are used with Ethernet networks? (Select two.)

Bus, Star

You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?

Partial Mesh

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.

You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.

Why do attackers prefer static environment devices to conduct distributed network attacks? (Select two.)

These devices tend to employ much weaker security than traditional network devices. These devices are typically more difficult to monitor than traditional network devices.

Match the Definition on the left with the SCADA technology term on the right.

Drag

1 A network of components that work together in order to remotely manage industrial equipment

2 Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process

3 Connects the supervisory computer to the RTUs or PLCs

4 Communicates with and sends control commands to connected SCADA devices

5 Connects equipment to the network via a phsical medium and converts digital data into signals that the equipment can process.

Drop

1 Remote Terminal Unit

2 DCS

3 Network Link

4 Supervisory Computer

5 Programmable Logic Controller

RTU - Connects the equipment to the network via wireless signal and converts digital data from the network into signals that the equipment can process. DCS - A network of components that work together in order to remotely manage industrial equipment. Network Link - Connects the supervisory computer to the RTUs or PLCs Supervisory Computer - Communicates with and sends control commands to connected SCADA devices Programmable Logic Controller - Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process.

Which of the following protocols is used during the call control process of multimedia communications?

Session Initiation Protocol

Which of the following is a valid IPv4 address? (Select two.)

172.16.1.26
10.384.0.5
2.2.2.2
1.254.1.1024
192.168.1.512
254.7.1.417
256.0.01

172.16.1.26, 2.2.2.2

Which of the following is a valid MAC address?

34-9A-86-1G-B3-24
73-99-12-61-15
255.255.255.0
83-5A-5B-0B-31-55-F1
C0-34-FF-15-01-8E
192.168.12.15

C0-34-FF-15-01-8E

Which of the following is a valid MAC address?

FABC.875E.9BG6
145.65.254.10
AB.07.CF.62.16.BD
95ABC2F4.ABC5.569D.43BF

AB.07.CF.62.16.BD

Consider the following IP addresses.
1. 124.77.8.5
2. 131.11.0.9
3. 190.66.250.10
4. 196.5.89.44
Which lists represents the ID address class of each listed IP address?

Class B, Class B, Class C, Class C
Class B, Class B, Class C, Class D
Class A, Class B, Class C, Class C
Class B, Class C, Class C, Class D
Class, A, Class B, Class B, Class C

A= 0-126 B= 128-191 C= 192-223 D= 223-239 E= 240-255

Class A, Class B, Class B, Class C

Which of the following are valid IPv6 IP addresses? Select all that apply.

6384:1319:7700:7631:446A:5511:8940:2552
127.0.0.1
165.15.78.53.100.1
192.168.2.15
343F:1EEE:ACDD:2034:1FF3:5012
141:0:0:0:15:0:0:1

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

Which three of the following are not valid IP addresses?

257.0.122.55
116.0.0.116
132.64.32.8
45.22.156.256
1.55.254.3
145.8.260.7
122.0.0.0

257.0.122.55 45.22.156.256 145.8.260.7

Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on a your network?

130.16.61.3

Which of the three of the following IP addresses are Class B addresses?

129.0.0.0
195.155.0.0
115.33.0.0
132.12.0.0
190.65.2.0
64.2.2.64
224.15.55.2

0-126 128-191 192-223 224-239 240-255

129.0.0.0 132.12.0.0 190.65.2.0

Which three of the following IP addresses are Class C addresses

222.55.0.0 223.16.5.0 192.15.5.55

Your network has been assigned the Class C network address of 200.78.151.0. Which three of the following addresses can be assigned to hosts on your network?

200.78.151.111 200.78.151.252 200.78.151.12

Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network?

179.113.65.12 179.113.0.118 179.113.89.0

Which three of the following IP addresses belong to the Class A network 114.0.0.0? (assume the network is indicated by the default portion of the IP address.)

114.122.66.12 114.0.0.15 114.58.12.0

In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host?

132.70.254.15

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select all that apply.)

A=1 B=2 C=3

168.16.5.1 129.0.0.1 191.168.2.15

What is the default subnet mask for the IP address 203.111.3.3?

255.255.255.0

Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.0.1

Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?

211.70.0.255

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.255.254

Which of the following is true about MAC address? (Select two.)

It is a 48-bit address. It is typically represented by hexadecimal numbers.

What is the binary format for the following decimal IP address? 131.9.202.111

10000011.00001001.11001010.01101111

What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011

206.58.170.67

You have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. Which mask should you use?

255.0.0.0

A host on the network has an IP address of 129,11,88,78 using the default subnet mask. How would you identify the address and mask using CIDR notation?

255.0.0.0 is 8 bits

129.11.99.78/16

You are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?

255.255.0.0

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.1 - 169.254.255.254

Which of the following is a valid IPv6 address?

FEC0:AB98::A7::9845:4567
199.12.254.11
FEC0::AB:9007
FEC0:AB04:899A
FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A

FEC0::AB:9007

Which of the following is not a reason to use subnets on a network

Combine different media types on to the same subnet.

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses.

What is the network address and subnet mask used by APIPA? (Select two.)

169.254.0.0 255.255.0.0

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use aPIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are ahving trouble configuring Internet access. What is the likely cause of the problem?

Private addresses can not directly communicate to hosts outside the local subnet.

Your computer has an IP address of 161.13.5.15. Your computer is on a:

Class C network
Private network
Multicast network
Public network

Public network

Which of the following IP addresses is a valid IP address for a host on a public network?

10.3.125.2
192.168.16.45
172.16.254.12
142.15.6.1

142.15.6.1

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

10.0.0.1 - 10.255.255.254
169.254.0.1 - 169.254.255.254
172.16.0.1 - 172.31.255.254
192.168.0.1 - 192.168.255.254

169.254.0.1 - 169.254.255.254

Which type of address is used in a packet to address the packet to a single host?

Unicast

A host has the address 100.55.177.99/16. Which of the following is the broadcast address for the subnet?

100.55.255.255

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.)

224.15.166.12
32.188.99.10
240.12.188.1
172.18.188.67
192.168.12.253
10.0.12.15
127.0.0.1

172.16-31.0.0

172.18.188.67 192.168.12.253 10.0.12.15

What type of address is the IP address 198.162.12.254/24

Unicast

Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?

Multicast

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?

Send it out to all ports except for the port it was received on.

Which of the following terms are often synonymous with or made possible with CIDR (Select two.)

NAT, OSPF, Classful, Classless, VLSM

Classless Inter-Domain Routing

VLSM, Classless

You manage a subnet that sues the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for that subnet?

Classful
Subnetting
Supernetting
Private

Supernetting

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type?

Multicast
Classless
Public
Classful
Broadcast

Classless

Which type of address is the IP address 232.111.252.250?

Multicast

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other host son the Internet. Why can't you access the server?

Private addresses are not accessible through the internet.

Which organization is responsible for allocating public IP addresses

IANA

Which of the following associates a port number with a host on a private network?

VLSM
PAT
NAT
CIDR

PAT

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?

Static NAT

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

10.0.0.0 - 10.255.255.255
192.168.0.0 - 192.168.255.255
172.16.0.0 - 172.31.255.255
169.254.0.0 - 169.254.255.255

169.254.0.0 - 169.254.255.255

You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?

Static

You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of Network Address Translation (NAT) should you implement?

Dynamic

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses

Which of the following is not a reason to use subnets on a network?

Improve security
Combine different media type on the same subnet
Extend the network
Isolate network problems

Combine different media type on the same subnet

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.)

172.17.32.0
172.17.128.0
172.17.0.0
172.17.16.0
172.17.96.0

172.17.128.0 172.17.0.0

You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the Internet. Which address would you use for the default gateway address?

The IP address assigned to Fa0/1 on Router1
The IP address assigned to Fa0/0 on Router2
The IP address assigned to SwitchA
The IP address assigned to Fa0/1 on Router 2
The IP address assigned to Fa0/0 on Router 1

Wrk1 - SwitchA - Fa0/0 - Router1 - Fa0/1 - SwitchB - Fa0/0 - Router2 - Fa0/1 - Internet

The IP address assigned to Fa0/0 on Router 1

You have a small network as shown in the Exhibit you have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the Internet to connect to sites like www.cisco.com. What other parameters are required on the work station? (Select two.)

WINS Server address
DNS Server address
Default gateway
Hostname
DHCP server address

Wrk1 - SwitchA - Fa0/0 - Router1 - Fa0/1 - SwitchB - Fa0/0 - Router2 - Fa0/1 - Internet

DNS Server address, Default gateway

You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the Internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?

IP address and subnet mask

You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop downs, select the appropriate parameters to configure the workstations TCP/IP settings.

DNS1 - 198.162.1.22
Internet - 166.11.199.77/22
RouterA - 192.168.12.34/28
Wrk1

IP address - 192.168.12.30
192.168.12.32
192.168.12.46
192.168.12.47
Subnet Mask - 255.255.255.0
255.255.255.240
255.255.255.224
Default Gateway - 166.11.199.77
192.168.12.34
198.162.1.22
DNS Server - 166.11.199.77
192.168.12.34
198.162.1.22

IP address - 192.168.12.46 Subnet Mask - 255.255.255.240 Default Gateway - 192.168.12.34 DNS Server - 198.162.1.22

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not known the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

Match the IPv6 address configuration method on the right with its definition on the left.

Drag

1 - Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP).

2 - Provides each client with an IP address, default gateway, and other IP configuration information.

3 - The prefix is statically assigned and the interface ID is derived from the MAC address.

4 - The entire 128-bit address and all other configuration information is statically assigned to the host.

5 - Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client.

Drop - Static Full Assignment - 4 Static Partial Assignment - 3 Stateless Autoconfiguration - 1 Stateful DHCPv6 - 2 Stateles DHCPv6 - 5

Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?

4 -to- 6 tunneling

You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet.
All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. You want to use a site-to-site tunneling method instead of a host-to-host tunneling method.
Which IPv6 solution should you use?

6 -to- 4 Tunneling

Which of the following are characteristics of Teredo tunneling? (Select three.)

Dual stack routers
Tunnel endpoints configured on hosts
Dual stack hosts
Works through NAT
IPv4-only hosts communicate with IPv6-only hosts.

Tunnel endpoints configured on hosts, dual stack hosts, works through NAT

You have a server at work with a custom application installed. Connections to the server that use the custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your Linux laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost-effect solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which client software should you use to connect to the server?

4 -to- 6
Miredo
ISATAP
6 -to- 4

Miredo

You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment method is being used?

Stateless autoconfiguration

Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?

BGP

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?

OSPF

Which of the following routing protocols is classified as a balanced hybrid routing protocol?

EIGRP

Which of the following routing protocols are classified as link state routing protocols? (Select two.)

IS-IS, OSPF

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not.

Which of the following protocols has a limit of 15 hops between any two networks?

RIP

What is the main difference betwen RIP and RIPv2?

RIP is a classful protocol, while RIPv2 is a classless protocol

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?

If the network is connected to the Internet using multiple ISPs

Which of the following statements about RIP is true?

RIP is the routing protocol used on the Internet.

RIP is a link state routing protocol.

RIP uses hop counts as the cost metric

RIP is suitable for large networks

RIP uses hop counts as the cost metric.

Which of the following best describes OSPF?

OSPF is a classful distance vector routing protocol.

OSPF is a classless link-state routing protocol.

OSPF is a classful link-state routing protocol.

OSPF is a classless distance vector routing protocol.

OSPF is a classless link-state routing protocol.

What information does the next hop entry in a routing table identify?

The first router in the path to the destination network.

A router is connected to the network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0.
The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Forward the packet to the next hop router specified by the rout to network 0.0.0.0.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet.

You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?

IGP

Which of the following is a characteristic of static routing when compared to dynamic routing?

All routes must be manually updated on the router.

You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?

Manually reconfigure the default route to point to the new next hop router.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?

Wait for convergence to take place.

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?

Convergence

Which two of the following tasks do routers perform?

Route data based on logical network addresses. Maintain information about paths through an internetwork

Drag the collision domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.

Drag
Single collision domain
Multiple collision domains

Drop
Hub, Switch, 802.11n wireless access point,
router, bridge, repeater, layer 3 switch

Hub - Single collision domain Switch - Multiple collision domain 802.11n wireless access point - Single collision domain Router - Multiple collision domains Bridge - Multiple collision domain Repeater - Single collision domain Layer 3 switch - Multiple collision domains

What is the primary purpose of gateway redundancy?

To overcome a single point of failure on the next hop router.

Which of the following protocols provide gateway redundancy? (Select all that apply.)

HSRP, VRRP, GLBP

Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets?

Route summarization

Match the default administrative distance with the route type.

Drag
0
1
5
90
100
110
120
170

Drop
IGRP
RIP
Static Route
EIGRP Internal Route
OSPF
EIGRP Summary Route
Connected Interface
EIGRP External Route

100,120,1,90,110,5,0,170

When multiple routes to a destination exist, what is used to select the best possible route?

Metric

Which of the following routing protocols uses relative link cost as the metric?

OSPF

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?

BGP

Which of the following are true for the IS-IS routing protocol? (Select two.)

Divides large networks into areas. Supports IPv6 routing.

Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company's network and the third-party's network to be connected via a dedicated WAN connection. As you prepare for the connection, you encounter a problem. The two networks need to be able to exchange routing information, but they use different routing protocols. The third-party organization uses RIP, and your network uses OSPF. What should you do to allow routing information to be exchanged?

Configure a border router to use route redistribution.

In virtualization, what is the role of the hypervisor?

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

What type of virtualization completely simulates a real physical host?

Full virtualization

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) and One virtual switch

The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.

Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with

Device Port Port Assignment
Virtual switch P1 Virtual Network1
P2 Virtual Network1
P3 Virtual Network1
P4 Physical Network
P5 Physical Network
Physical Switch P1 Physical Network
P2 Physical Network
P3 Physical Network
P4 Physical Network
P5 Physical Network

Virtual Network
Virtual OS1 -&gt;P1 -&gt; Virtual Switch
Virtual OS2 -&gt; P2 -&gt; Virtual Switch
Virtual OS3 -&gt; P3 -&gt; Virtual Switch
Virtual OS4 -&gt; P4 -&gt; Virtual Switch
Virtual Switch -&gt; P5 -&gt; P1 -&gt; Physical Switch

Physical Network
Physical OS1 -&gt; P2 -&gt; Physical Switch
Physical OS2 -&gt; P3 -&gt; Physical Switch
Physical OS3 -&gt; P4 -&gt; Physical Switch
Physical OS4 -&gt; P5 -&gt; Physical Switch
Physical Switch -&gt; P1 -&gt; P5 -&gt; Virtual Switch

Virtual OS2, Virtual OS3

You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?

Virtual Servers

Which component is most likely to allow physical and virtual machines to communicate with each other?

Host operating system
VHD
Virtual switch
Virtual desktop

Virtual switch

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) and One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configurations for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with.

Device Port Port Assignment
Virtual Switch P1 Virtual Network1
P2 Virtual Network2
P3 Virtual Network1
P4 Virtual Network2
P5 Virtual Network1, Physical Network
Physical Switch P1 Physical Network
P2 Physical Network
P3 Physical Network
P4 Physical Network
P5 Physical Network

Virtual OS3, Physical OS1, Physical OS2, Physical OS3, Physical OS4

Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?

DaaS (Data)
PaaS (Platform)
SaaS (Software)
IaaS (infrastructure)

SaaS (Software as a Service

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

Which of the following is not true regarding cloud computing?

The term cloud is used as a metaphor for the internet

Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the service.

Cloud computing is software, data access, computation, and storage services provide to clients through the Internet.

Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like web browser.

Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services

Match each description on the left with the appropriate cloud technology on the right.

Drag

Provides cloud services to just about anyone

Allows cloud services to be shared by several organizations.

Integrates one cloud service with other cloud services.

Provides cloud services to a single organization

Drop

Public Cloud

Private Cloud

Community Cloud

Hybrid Cloud

Public Cloud - Provides clouds services to just about anyone. Private Cloud - Provides cloud services to a single organization Community Cloud - Allows cloud services to be shared by several organizations. Hybrid Cloud - Integrates one cloud service with other cloud services.

Which of the following are advantages of virtualization (Select two.)

Centralized administration
Redundancy of hardware components for fault tolerance
Easy migration of systems to different hardware
Reduced utilization of hardware resources
Improved detection of host based attacks

Centralized administration, easy migration of systems to different hardware.

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems versions and editions. Currently, all of our testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application ou are working on could adversely impact other network hosts if errors exist in the code. To prevent this you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do?

Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for host-only (internal) networking.

Match the virtualization feature on the right with the appropriate description on the left.

Drag - 1 Moving virtual machines between hypervisor hosts.
2 Verifying that security controls are working as designed.
3 Performing a physical-to-virtual migration (P2V)
4 Isolating a virtual machine from the physical network

Drop - Flexibility, testing, server consolidation, sandboxing

1,2,3,4

You are responsible for maintaining windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do?

Create a new virtual switch configured for bridged (external networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?

iSCSI Initiator

What key advantage does a virtual router have over physical router?

Multiple networks can be connected to single interface.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

Which of the following statements about virtual NIC's are true? (Select two)

Virtual NIC's need the appropriate driver installed to funciton

Virtual NIC's dont have a MAC address.

Multiple virtual NIC's can be added to a virtual machine

The type of NIC installed on a physical machine determines the type of virtual NIC that is emulated

Virtual NICs can communicate only with other virtual NICs

Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine

Arrange the Fiber Channel SAN implementation tasks in the order they should be performed.

1 Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives
2 Deploy a Fiber Channel switch
3 Install a Fiber Channel adapter in each server that will access the share storage on the SAN
4 Connect each server to the Fiber channel switch using the appropriate fiber optic cabling for the equipment you are using.

3241

Which of the following does not accurately describe an iSCSI SAN?

Uses port 3260 by default

Requires special hardware and knowledge to implement

Requires special hardware and knowledge to implement

Testout - Subjecto.com

Testout

Your page rank:

Total word count: 12280
Pages: 45

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Cache web pages, Block employees from accessing certain websites

Which of the following functions are performed by proxies?

Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance.

Install a proxy server

Which of the following allows you to save frequently-accessed websites on your local network for later retrieval?

Proxy

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

How does a proxy server differ from a packet filtering firewall?

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.

Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?

Switch

Which network component connects a device with the transmission media and allows it to send and receive messages?

Network interface card

Which of the following hardware devices links multiple networks and directs traffic between networks?

Router

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?

Hub

What device sends signals from a computer onto a network?

Transceiver

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub, Repeater

Which of the following statements accurately describes how a modem works?

It demodulates analog data from a telephone network into digital PC data. It modulates digital data from the PC into analog data and transmits it on a telephone network.

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header.

Which of the following is a firewall function?

Packet filtering

As a security precaution, you have implemented IPsec that is used between any two devices on your network. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.

Host-based IDS

What security mechanism can be used to detect attacks originating on the Internet or from within an internal, trusted subnet?

IDS

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

Firewall

What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack?

An alert is generated and delivered via e-mail, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

Which of the following activities are considered passive in regards to the functioning of an intrusion detection system?

Listening to network traffic, Monitoring the audit trails on a server

An active IDS system often performs which of the following actions?

Update filters to block suspect traffic, Perform reverse lookups to identify an intruder

Which of the following prevents access based on website ratings and classifications?

Content filter

What does an IDS that uses signature recognition use for identifying attacks?

Comparison to a database of known attacks

Which of the following is the most common detection method used by an IDS?

Signature

You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Update the signature files

Which of the following devices can monitor a network and detect potential security attacks?

IDS

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

Which of the following are security devices that perform stateful inspection of packet data, looking for patterns that indicate malicious code?

IDS, IPS

You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization?

Enforcement of the organization’s Internet usage policy, An increase in bandwidth availability

Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. what step must be taken to ensure that the information is useful in maintaining a secure environment?

Periodic reviews must be conducted to detect malicious activity or policy violations.

Which of the following devices is capable of detecting and responding to security threats?

IPS

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want to take immediate action when possible to stop or prevent the attack. Which tool should you use?

IPS

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out to ports 2-8.

Which of the following devices does not segment the network?

Hub

Which of the following devices is capable of performing routing of IP packets at wire speeds using an ASIC module instead of the CPU or software?

Layer 3 switch

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static Web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your Web content. The device should not be able to distribute requests between the various Web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions.

Content Switch

Drag the broadcast domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.

Hub
Unmanaged switch
802.11n wireless access point
Router
Bridge
Repeater
Layer 3 Switch

Single broadcast domain Single broadcast domain Single broadcast domain Multiple broadcast domains Single broadcast domain Single broadcast domain Multiple broadcast domains

You manage a server that runs your company website. The website includes streaming video that shows features of some of your products. The link connecting your server to the Internet charges based on bandwidth use. when the bandwidth spikes, so does your bill. You would like to implement a solution to prevent the amount of traffic sent over the WAN link from exceeding a specific level. Which solution should you implement?

Traffic shaper

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and provide for future growth?

Switch

Which of the following devices can monitor a network and detect potential security attacks?

IDS

which of the following devices is capable of detecting and responding to security threats?

IPS

What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?

IDS

What actions can a typical passive intrusion Detection System (IDS) take when it detects an attack? (Select two.)

An alert is generated and delivered via Email, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?

IPS

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for a traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?

Host based IDS

What IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database

Signature based

You are concerned about protecting your network from network-based attack from the Internet. Specifically, you are concerned about zero-day attacks (attacks that have not yet been identified or that do not have prescribed protections.) Which type of device should you use?

Anomaly based IDS

You have a Web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement?

Load balancing

You manage a server that runs your company website. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that a second server can respond to requests for website content. Which solution should you implement?

Load balancin

You are concerned about protecting your network from network-based attacks from the Internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

Anomaly based IDS

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization’s order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration (Select two.)

Configure the browser to send HTTPS requests through the VPN connection, Configure the VPN connection to use IPsec

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)

RADIUS, TACACS+

You have decided to implement a remote access solution that uses multiple remote access servers. you want to implement RADIUS to centralize remove access authentication and authorization. Which of the following would be a required part of your configuration?

Configure remote access servers as RADIUS clients.

Which of the following are characteristics of TACACS+ (Select two.)

Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting.

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to split between different servers.

Which of the following protocols can be used to centralize remote access authentication?

TACACS

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. what service should you implement?

RAS

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

You are configuring your computer to dial up to the Internet. What protocol should you use?

PPP

Which of the following protocols or services is commonly used on cable Internet connections for user authentication?

PPPoE

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?

Remote access

Which of the following protocols can your portable computer use to connect to your company’s network via a virtual tunnel through the Internet? (select two.)

PPTP, L2TP

IPsec is implemented through two separate protocols. What are these protocols called? (Selected two.)

ESP, AH

Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?

IPsec

You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?

PPPoE

RADIUS is primarily used for what purpose?

Authenticating remote clients before access to the network is granted.

Which of the following is a characteristics of TACAS+

Encrypts the entire packet, not just the authentication packets

Which of the following ports are used with TACAS?

49

Which of the following statements about SSL VPN are true? (Select two.)

encrypts the entire communication session, uses port 443

Which of the following can route layer 3 protocols across an IP network?

GRE

Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. Which unified communication feature is this?

Presence information

You’ve been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them?

Unified communication

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?

Port forwarding

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use?

DNS Server

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?

DNS

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a windows XP client system and using the ipconfig command, receive the following information

Ethernet adapter Local Area Connection 1:
Description . . . . . . . . . . : CardBus-I 10/100 PC Card
Physical Address . . . . . . . : 02-00-4C-4F-3F-50
DHCP Enabled . . . . . . . . . . . : Yes
Autoconfiguration enabled . . . . . . Yes
Autoconfiguration IP Address . . . . . . . :169.254.25.129
Subnet Mask . . . . . . . . . . . 255.255.0.0
Default Gateway . . . . . . . . :
DNS Servers . . . . . . . . :

Which of the following statements are true? (Select two).

The client system is configured to use DHCP, the client system is unable to reach the DHCP server.

You have configured your organizations dHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days.
A user’s workstation is powered on and receives addressing information from this DHCP server Monday morning at 8:00AM.
When will the client contact the DHCP server to renew the lease (by default)?

Wednesday Morning

Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?

A DHCP server assigns addresses to requesting hosts. It can deliver other configuration information in addition to IP addresses.

Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (select two.)

Install a DHCP server on the network. Use Automatic Private IP Addressing

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?

DHCP Server

You are implementing a DHCP server for your segment. Your Segment’s IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on youe DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem?

You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06)

Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to addres 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure?

The clients must be configured to obtain IP addressing from a DHCP server.

You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 89, and Macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user’s computer and receive the following output:

0 ethernet adapter:
IP address . . . . . . . . . : 169.254.1.17
Subnet Mask . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . :

You also check your NIC and see the link light on.
what might the problem be?

Unavailable DHCP server

Which of the following functions are performed by proxies? (Select two.)

Cache web pages, block employees from accessing certain websites

You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem?

A proxy server is blocking access to the websites

Which fo the following solutions would you implement to track which websites network users are accessing?

Proxy

You would like to control Internet access based on users, time of day, and websites visited. How can you do this?

Install a proxy server. Allow Internet access only through the proxy server.

You manage a server that runs your company website. The web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content.

Proxy Server

Which of the following are true of a circuit proxy filter firewall (Select two.)

Operates at the Session layer. Verifies sequencing of session packets.

Which of the following are true about reverse proxy? (Select two.)

Can perform load balancing, authentication, and caching. Handles requests from the Internet to a server in a private network.

Listed below are several DNS record types. Match the record type on the left with its function on the right.

Drag: A, CNAME. MX. PTR. AAAA

Drop: Points a hostname to an IPv4 address
Provides alternate names to hosts that already have a host record.
Points an IP address to a hostname.
Points a hostname to an IPv6 address
Identifies servers that can be used to deliver mail.

A, CNAME, PTR, AAAA, MX

You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router.
Which of the following would be the best action to take in order to fix the problem?

Implement an IP Helper address on the router.

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?

Specify which server network interface the agent listens on for DHCP messages.

Which of the following services automatically creates and deletes host records when an IP address lease is created or released?

Dynamic DNS

If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? (Select two.)

The ipconfig /release command is entered on a workstation. The DHCP server renews an IP address lease.

You have a WIndows Server 2012 system that you want to use as a DHCP Relay Agent. Which Windows Server 2012 service would you use to do this?

Routing and Remote Access

You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1
Which of the following commands would be used to configure the router?

ip helper-address 172.16.30.1

Based on the diagram, which type of proxy server is handling the client’s request?

Client —-&gt; Internet —-&gt; Proxy —-&gt; Server 1

Proxy and Server 1 are an internal network

Reverse Proxy

You have installed an ISDN connection into your home so you can connect to the Internet and talk on the phone at the same time. While you are talking on the telephone, what is the maximum data rate of your internet connection?

ISDN supports 128Kbps total

64Kbps

What is the speed of an OC-3 connection

OC-1= 51.84 Mbps

155.52mbps

Which two of the following describe the channels and data transfer rates used for ISDN BRI?

One D channel operating at 16Kbps Two B channels operating at 64 Kbps each

Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?

ISDN BRI

Which three of the following are advantages of ISDN BRI

It uses existing telephone lines for digital data transmission. It can be used to transmit multiple data types on the same line (data, voice, video, and so on). It has faster connect times than traditional dial-up access.

Which three of the following are characteristics of ISDN?

It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop. It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines.

If the SONET (OC-1) based data rate is 51.84Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second

622.08Mbps

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly?

Wireless

You are moving to an area where DSL will be available in the next six moths. Which method of Internet connectivity should you implement until DSL is available, if your existing connectivity needs are minimal?

PSTN

Which of the following is most susceptible to interference related to atmospheric conditions?

Satellite

To access the Internet through the PSTN, what kind of connectivity device must you use?

Modem

Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber optic networking?

SONET

Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?

MPLS

Which of the following are characteristics of MPLS? (Select two.)

Supports variable-length data units, Adds labels to data units

Which of the following are characteristics of ATM (Select two.)

Adds labels to data units, Uses fixed-length cells of 53-bytes

Which of the following are characteristics of SONET? (Select two.)

Transport protocol used for other traffic types (such as ATM) Dual counter-rotating fiber optic rings

Which of the following describes the lines used in the local loop for dial-up telephone access?

POTS

Which of the following terms identifies the network of dial-up telephone and long-distance lines?

PSTN

Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)

ISDN BRI, ADSL

Which four of the following are the responsibility of the WAN service provider

DCE, CO, PSE, Local loop

Which network type divides transmitted data into smaller pieces and allows for multiple communications on the network medium?

Packet-switched

Which network type establishes a dedicated physical connection between two hosts in order to transmit time-sensitive data?

Circuit-switched

Which of the following WAN technologies provides packet switching over high-quality digital liens at speeds greater than 1.544 Mbps

Frame Relay

Which WAN connection types use digital communications over public telephone lines? (Select two.)

DSL, ISDN

Which of the following correct describes the T1 carrier system? (Select two.)

A single T1 channel can transfer data at 64 Kbps T1 lines use two pairs of copper wire

Which of the following WAN technologies is a dial-up only service?

ISDN BRI

You are implementing Internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20-30 Mbps. Which type of service should you implement

T3

When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites?

Packets

Which networking technology creates virtual links between two remote network endpoints by prefixing packets with a header containing one or more labels?

MPLS

Which of the following is true of Multiprotocol Label Switching? (Select two.)

It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.

Which of the following is true of Multiprotocol Label Switching? (Select two.)

MLPS is designed to work with many different protocols. MPLS-enabled routers switch packets based on the label information, not the packet contents.

What is the maximum data rate of an ISDN BRI line?

128Kbps

Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)

Two B channels operating at 64 Kbps each, One D channel operating at 16 Kbps

Which of the following are characteristics of ISDN? (Select three.)

It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop.

Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?

DSL

Which of the following services are available regardless of whether the telephone company network is available?

Cable modem

You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

Which WAN connection types use digital communications over POTS? (Select two.)

ISDN, DSL

Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?

PPP

RouterA is connected to RouterB through Serial 1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which sent of commands would you use on RouterA to complete the configuration?

A. RouterA(config)#username RouterB password cisco
RouterA (config)#int s1
RouterA(config-if)#encap ppp
RouterA(config-if)#ppp auth chap

B.
RouterA(config)#int s1
RouterA(config-if)#encap ppp
RouterA(config-if)#ppp auth chap
RouterA(config-if)#ppp chap username RouterB password cisco

C.
RouterA(config)#int s1
RouterA(config-if)#encap ppp
RouterA(config-if)#ppp chap username RouterA password cisco

A

Which of the following statements about the functionality of LCP are true? (Select three.)

Data can be compressed at the source and decompressed at the destination. LCP provides multilink support. Usernames and passwords may be required during the handshake.

Which of the following are benefits of LCP? (Select three.)

Monitors data dropped on the link and avoids frame looping. Provides load balancing across multiple links. Negotiates the use (or lack) of authentication before starting the session.

What is the connection order used by two TCP/IP routers to open a session with PPP including authentication?

1 authentication
2 NCP
3 LCP

LCP, authentication, NCP

PPP supports authentication, compression, and multiple Network-layer protocols.
Which of the following correctly sequences these functions when a PPP link is established?

1 Negotiate compression Settings
2 Negotiate Network-layer protocols
3 Perform authentication

Negotiate compression Settings, Perform authentication, Negotiate Network-layer protocols

Which of the following protocols is used by PPP to enable support for multiple Network-layer protocols?

NCP

Which of the following Internet services provides equal upload and download bandwidth?

SDSL

Which of the following are characteristics of VDSL? (Select two.)

Unequal download and upload speeds, Supports both data and voice at the same time

Which of the following is a characteristic of SDSL?

Supports data traffic only( no voice)

Which of the following technologies does GSM use to allow multiple connections on the same frequency?

Time division multiple access

Which of the following cellular network types does not provide Internet connectivity?

4G, LTE, 2G, EDGE, HSPA+

2G

Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.)

HSPA+, LTE

Drag the cellular network specification on the left to its corresponding mobile technology generation on the right.

Drag:
LTE, GSM, WiMAX, HSPA+, CDMA

Drop:
2G:__,__
3G:__,__
4G:__,__

2G: GSM, CDMA 3G: LTE, HSPA+ 4G: WiMAX

Which of the following describe the EDGE cellular technology? (Select two.)

Offers speeds of 400-1000Kbps, The first internet compatible technology

Which of the following geographic network types are typically managed by a city as a public utility?

Metropolitan Area Network (MAN)

Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are sever kilometers apart?

Single mode

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.)

Greater cable distances without a repeater, Immunity to electromagnetic interference

Which pins in an RJ45 connetor are used to transmit data when used on a 100BaseT Ethernet network? (Select two.)

Pin 1: Tx+
Pin 2: Tx-
Pin 3: Rx+
Pin 4: Unused
Pin 5: Unused
Pin 6: Rx-
Pin 7: Unused
Pin 8: Unused

Pin 1, Pin 2

You are installing networking wiring for a new Ethernet network at your company’s main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of CAtegory 3 network cable in storage. Upon investigation it appears very similar to Category 5 wiring. Should you use Category 3 cabling as a substitute for Category 5 cabling to finish the project?

No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates.

Which of the following are characteristics of coaxial network cable? (choose three.)

The ends of the cable must be terminated, It has a conductor made from copper in the center of the cable, It uses two concentric metallic conductors.

Which of the following is true about single mode fiber optic network cabling?

The central core is smaller than that of multimode fiber optic cabling.

What is the minimum cable specification that supports 1000Mbps Ethernet?

Cat 5e

Which of the following cable types often includes a solid plastic core?

Cat 6

Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? (Select two.)

RG-6, RG-59

You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can’t find any RG-6 cable. Which cable types could you use instead?

RG-8 and RG-58 have an impedance rating of 50 ohms
RG-59 and RG-6 have an impedance rating of 75 ohms

RG-59

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum

Of the following cables, which offer the best protection against EMI?

Cat 5, RG-6, Single mode fiber optic, Cat 5e

Single mode fiber optic

Of the following cables, which offer the best protection against EMI?

RG-6, Cat 6e, Cat 5, Cat5e

RG-6

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Crossover

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

Crossover

You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?

Crossover

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?

Straight-through

You have purchased a new router that you need to configure. You need to connect a workstation to the router’s console port to complete the configuration tasks. Which type of cable would you most likely use?

Rollover

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BasTX switch ports. Which device should you use?

Media converter

At which OSI model layer does a media converter operate?

Layer 1

What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two.)

GBIC, SFP

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-type

Which of the following connectors usually require polishing as part of the assembly process? (select two.)

SC, ST

Which of the following connectors is used with Ethernet 10BaseT networks?

RJ-45

In which of the following situations might you use an RJ-11 connector?

You want to connect the 10BaseT network card in your computer to a switch

You want to connect your computer to the internet with a dial-up connection

You want to upgrade your 10BaseT to 100BaseT

You want to connect your computer to the internet with a dial-up connection

Which of the following are characteristics of an LC fiber optic connector? (choose two.)

They use a housing and latch system similar to an RJ-45 UTP connector. They are half the size of standard connectors.

Which of the following are characteristics of an MT-RJ fiber optic connector? (select two.)

They use metal guide pins to ensure accurate alignment. They can be used with multimode fiber optic cables.

You want to use the T568A standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?

White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

Which of the following connectors is used with fiber optic cables and connects using a twisting motion?

ST

Which of the following connectors are used with fiber optic cables andi nclude both cables in a single connector? (Select two.)

LC, MT-RJ

Which of the following connectors is typically used on one end of a rollover cable?

Serial

When would you typically use an RJ-11 connector?

When connecting a phone to a phone line.

Which of the following standards is typically used in a rollover cable?

RS-232

F-type connectors are typically used with cables using which of the following standards? (select two.)

RG-6, RG-59

Which of the following uses metal clips placed over plastic slots for connecting individual copper wires?

110 block

When using 110 blocks for connecting Cat5 and higher data cables, which recommendation should you follow?

Keep wire pairs twisted up to within one-half of an inch of the connector.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?

Crimping tool

What tool should you use to extend network services beyond the demarc?

Punchdown tool

You are making Ethernet drop cables using Cat5e and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use?

Cable stripper

You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. Which tool should you use?

Punchdown tool

Which of the following tests can be performed by a TDR? (Select two.)

Identify the location of a fault on a cable. Measure the length of a cable.

You are working with an existing fiber optic installation in your building. You want to know how long each length of a cable is that runs through the walls. Which tool should you use?

OTDR

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?

TDR

You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time, which of the following should you do?

Point the cut side of the tool towards the wire end. Use a punchdown tool with a notched blade.

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100Mbps. Which tool should you use to test the drop cable and the connection to the network?

Certifier

You’ve connected a cable certifier to an RJ45 walljack, and the output shown below is displayed on the device. What does this output indicate? (Select two.)

1 – 3
2 – 6
3 – 1
4 – 7
5 – 8
6 – 2
7 – 4
8 – 5

This is a crossover cable The cable is functioning correctly.

You’ve connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. what does this output indicate?

1 x 1
2 x 2
3 – 3
4 – 4
5 – 5
6 – 6
7 – 7
8 – 8

Pins 1 and 2 are shorted

You’ve connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. What does this output indicate? (Select two.)

1 – 1
2 – 2
3 – 3
4 4
5 – 5
6 6
7 – 7
8 – 8

Pin 4 is open, Pin 6 is open

You’re responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference (EMI) Which type of cabling would operate best in this environment? (Choose two.)

Fiber-optic cable, shielded twisted pair cable

Which of the following connector types would you most likely use to connect to a T1 WAN service?

RJ48c

You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter?

BNC

Which of the following connector types are used with UTP cables? (Select two.)

RJ-45, RJ-11

Match cable heads in Testout question 211 B.2 Network+ Domainm 1: Network Architecture, All Questions

DB-25, DB-9, RJ-45, RJ-11, LC, BNC< F-Type

You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable’s ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable

Angled Physical Contact polish

Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type?

Angled Physical Contact

You have a network that sues a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reached the destination device.

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network

Which of the following topologies connects all devices to a trunk cable?

Bus

Which of the following topologies connects each device to a neighboring device?

Ring

In which of the following topologies does each device on the network act as a repeater,s ending the signal to the next device?

Ring

Which of the following topologies connects each network device to a central hub?

Star

You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?

Mesh

What device is used to create a physical star topology?

Switch

You have a small network that uses a hub to connect multiple devices. What physical topology is used?

Star

You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link. What type of connection is being used?

Point-to-point

You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites. What type of connection is being used?

Point-to-multipoint

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following describes what happens to the network communications?

No devices will be able to communicate

You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications?

All devices except the device connected with the drop cable will be able to communicate

You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications?

Device A will be able to communicate with all other devices.

You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?

Peer-to-peer

You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have?

Client-server

Which of the following physical topologies are used with Ethernet networks? (Select two.)

Bus, Star

You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don’t have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?

Partial Mesh

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Install the latest firmware updates from the device manufacturer. Verify that your network’s existing security infrastructure is working properly.

You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Install the latest firmware updates from the device manufacturer. Verify that your network’s existing security infrastructure is working properly.

Why do attackers prefer static environment devices to conduct distributed network attacks? (Select two.)

These devices tend to employ much weaker security than traditional network devices. These devices are typically more difficult to monitor than traditional network devices.

Match the Definition on the left with the SCADA technology term on the right.

Drag

1 A network of components that work together in order to remotely manage industrial equipment

2 Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process

3 Connects the supervisory computer to the RTUs or PLCs

4 Communicates with and sends control commands to connected SCADA devices

5 Connects equipment to the network via a phsical medium and converts digital data into signals that the equipment can process.

Drop

1 Remote Terminal Unit

2 DCS

3 Network Link

4 Supervisory Computer

5 Programmable Logic Controller

RTU – Connects the equipment to the network via wireless signal and converts digital data from the network into signals that the equipment can process. DCS – A network of components that work together in order to remotely manage industrial equipment. Network Link – Connects the supervisory computer to the RTUs or PLCs Supervisory Computer – Communicates with and sends control commands to connected SCADA devices Programmable Logic Controller – Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process.

Which of the following protocols is used during the call control process of multimedia communications?

Session Initiation Protocol

Which of the following is a valid IPv4 address? (Select two.)

172.16.1.26
10.384.0.5
2.2.2.2
1.254.1.1024
192.168.1.512
254.7.1.417
256.0.01

172.16.1.26, 2.2.2.2

Which of the following is a valid MAC address?

34-9A-86-1G-B3-24
73-99-12-61-15
255.255.255.0
83-5A-5B-0B-31-55-F1
C0-34-FF-15-01-8E
192.168.12.15

C0-34-FF-15-01-8E

Which of the following is a valid MAC address?

FABC.875E.9BG6
145.65.254.10
AB.07.CF.62.16.BD
95ABC2F4.ABC5.569D.43BF

AB.07.CF.62.16.BD

Consider the following IP addresses.
1. 124.77.8.5
2. 131.11.0.9
3. 190.66.250.10
4. 196.5.89.44
Which lists represents the ID address class of each listed IP address?

Class B, Class B, Class C, Class C
Class B, Class B, Class C, Class D
Class A, Class B, Class C, Class C
Class B, Class C, Class C, Class D
Class, A, Class B, Class B, Class C

A= 0-126 B= 128-191 C= 192-223 D= 223-239 E= 240-255

Class A, Class B, Class B, Class C

Which of the following are valid IPv6 IP addresses? Select all that apply.

6384:1319:7700:7631:446A:5511:8940:2552
127.0.0.1
165.15.78.53.100.1
192.168.2.15
343F:1EEE:ACDD:2034:1FF3:5012
141:0:0:0:15:0:0:1

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

Which three of the following are not valid IP addresses?

257.0.122.55
116.0.0.116
132.64.32.8
45.22.156.256
1.55.254.3
145.8.260.7
122.0.0.0

257.0.122.55 45.22.156.256 145.8.260.7

Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on a your network?

130.16.61.3

Which of the three of the following IP addresses are Class B addresses?

129.0.0.0
195.155.0.0
115.33.0.0
132.12.0.0
190.65.2.0
64.2.2.64
224.15.55.2

0-126 128-191 192-223 224-239 240-255

129.0.0.0 132.12.0.0 190.65.2.0

Which three of the following IP addresses are Class C addresses

222.55.0.0 223.16.5.0 192.15.5.55

Your network has been assigned the Class C network address of 200.78.151.0. Which three of the following addresses can be assigned to hosts on your network?

200.78.151.111 200.78.151.252 200.78.151.12

Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network?

179.113.65.12 179.113.0.118 179.113.89.0

Which three of the following IP addresses belong to the Class A network 114.0.0.0? (assume the network is indicated by the default portion of the IP address.)

114.122.66.12 114.0.0.15 114.58.12.0

In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host?

132.70.254.15

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select all that apply.)

A=1 B=2 C=3

168.16.5.1 129.0.0.1 191.168.2.15

What is the default subnet mask for the IP address 203.111.3.3?

255.255.255.0

Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.0.1

Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?

211.70.0.255

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.255.254

Which of the following is true about MAC address? (Select two.)

It is a 48-bit address. It is typically represented by hexadecimal numbers.

What is the binary format for the following decimal IP address? 131.9.202.111

10000011.00001001.11001010.01101111

What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011

206.58.170.67

You have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. Which mask should you use?

255.0.0.0

A host on the network has an IP address of 129,11,88,78 using the default subnet mask. How would you identify the address and mask using CIDR notation?

255.0.0.0 is 8 bits

129.11.99.78/16

You are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?

255.255.0.0

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.1 – 169.254.255.254

Which of the following is a valid IPv6 address?

FEC0:AB98::A7::9845:4567
199.12.254.11
FEC0::AB:9007
FEC0:AB04:899A
FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A

FEC0::AB:9007

Which of the following is not a reason to use subnets on a network

Combine different media types on to the same subnet.

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses.

What is the network address and subnet mask used by APIPA? (Select two.)

169.254.0.0 255.255.0.0

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use aPIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are ahving trouble configuring Internet access. What is the likely cause of the problem?

Private addresses can not directly communicate to hosts outside the local subnet.

Your computer has an IP address of 161.13.5.15. Your computer is on a:

Class C network
Private network
Multicast network
Public network

Public network

Which of the following IP addresses is a valid IP address for a host on a public network?

10.3.125.2
192.168.16.45
172.16.254.12
142.15.6.1

142.15.6.1

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

10.0.0.1 – 10.255.255.254
169.254.0.1 – 169.254.255.254
172.16.0.1 – 172.31.255.254
192.168.0.1 – 192.168.255.254

169.254.0.1 – 169.254.255.254

Which type of address is used in a packet to address the packet to a single host?

Unicast

A host has the address 100.55.177.99/16. Which of the following is the broadcast address for the subnet?

100.55.255.255

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.)

224.15.166.12
32.188.99.10
240.12.188.1
172.18.188.67
192.168.12.253
10.0.12.15
127.0.0.1

172.16-31.0.0

172.18.188.67 192.168.12.253 10.0.12.15

What type of address is the IP address 198.162.12.254/24

Unicast

Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?

Multicast

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?

Send it out to all ports except for the port it was received on.

Which of the following terms are often synonymous with or made possible with CIDR (Select two.)

NAT, OSPF, Classful, Classless, VLSM

Classless Inter-Domain Routing

VLSM, Classless

You manage a subnet that sues the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for that subnet?

Classful
Subnetting
Supernetting
Private

Supernetting

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type?

Multicast
Classless
Public
Classful
Broadcast

Classless

Which type of address is the IP address 232.111.252.250?

Multicast

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other host son the Internet. Why can’t you access the server?

Private addresses are not accessible through the internet.

Which organization is responsible for allocating public IP addresses

IANA

Which of the following associates a port number with a host on a private network?

VLSM
PAT
NAT
CIDR

PAT

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?

Static NAT

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

10.0.0.0 – 10.255.255.255
192.168.0.0 – 192.168.255.255
172.16.0.0 – 172.31.255.255
169.254.0.0 – 169.254.255.255

169.254.0.0 – 169.254.255.255

You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don’t want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?

Static

You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of Network Address Translation (NAT) should you implement?

Dynamic

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses

Which of the following is not a reason to use subnets on a network?

Improve security
Combine different media type on the same subnet
Extend the network
Isolate network problems

Combine different media type on the same subnet

You’ve decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.)

172.17.32.0
172.17.128.0
172.17.0.0
172.17.16.0
172.17.96.0

172.17.128.0 172.17.0.0

You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the Internet. Which address would you use for the default gateway address?

The IP address assigned to Fa0/1 on Router1
The IP address assigned to Fa0/0 on Router2
The IP address assigned to SwitchA
The IP address assigned to Fa0/1 on Router 2
The IP address assigned to Fa0/0 on Router 1

Wrk1 – SwitchA – Fa0/0 – Router1 – Fa0/1 – SwitchB – Fa0/0 – Router2 – Fa0/1 – Internet

The IP address assigned to Fa0/0 on Router 1

You have a small network as shown in the Exhibit you have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the Internet to connect to sites like www.cisco.com. What other parameters are required on the work station? (Select two.)

WINS Server address
DNS Server address
Default gateway
Hostname
DHCP server address

Wrk1 – SwitchA – Fa0/0 – Router1 – Fa0/1 – SwitchB – Fa0/0 – Router2 – Fa0/1 – Internet

DNS Server address, Default gateway

You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the Internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?

IP address and subnet mask

You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop downs, select the appropriate parameters to configure the workstations TCP/IP settings.

DNS1 – 198.162.1.22
Internet – 166.11.199.77/22
RouterA – 192.168.12.34/28
Wrk1

IP address – 192.168.12.30
192.168.12.32
192.168.12.46
192.168.12.47
Subnet Mask – 255.255.255.0
255.255.255.240
255.255.255.224
Default Gateway – 166.11.199.77
192.168.12.34
198.162.1.22
DNS Server – 166.11.199.77
192.168.12.34
198.162.1.22

IP address – 192.168.12.46 Subnet Mask – 255.255.255.240 Default Gateway – 192.168.12.34 DNS Server – 198.162.1.22

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not known the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

Match the IPv6 address configuration method on the right with its definition on the left.

Drag

1 – Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP).

2 – Provides each client with an IP address, default gateway, and other IP configuration information.

3 – The prefix is statically assigned and the interface ID is derived from the MAC address.

4 – The entire 128-bit address and all other configuration information is statically assigned to the host.

5 – Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client.

Drop – Static Full Assignment – 4 Static Partial Assignment – 3 Stateless Autoconfiguration – 1 Stateful DHCPv6 – 2 Stateles DHCPv6 – 5

Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?

4 -to- 6 tunneling

You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet.
All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. You want to use a site-to-site tunneling method instead of a host-to-host tunneling method.
Which IPv6 solution should you use?

6 -to- 4 Tunneling

Which of the following are characteristics of Teredo tunneling? (Select three.)

Dual stack routers
Tunnel endpoints configured on hosts
Dual stack hosts
Works through NAT
IPv4-only hosts communicate with IPv6-only hosts.

Tunnel endpoints configured on hosts, dual stack hosts, works through NAT

You have a server at work with a custom application installed. Connections to the server that use the custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your Linux laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost-effect solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which client software should you use to connect to the server?

4 -to- 6
Miredo
ISATAP
6 -to- 4

Miredo

You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment method is being used?

Stateless autoconfiguration

Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?

BGP

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?

OSPF

Which of the following routing protocols is classified as a balanced hybrid routing protocol?

EIGRP

Which of the following routing protocols are classified as link state routing protocols? (Select two.)

IS-IS, OSPF

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not.

Which of the following protocols has a limit of 15 hops between any two networks?

RIP

What is the main difference betwen RIP and RIPv2?

RIP is a classful protocol, while RIPv2 is a classless protocol

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?

If the network is connected to the Internet using multiple ISPs

Which of the following statements about RIP is true?

RIP is the routing protocol used on the Internet.

RIP is a link state routing protocol.

RIP uses hop counts as the cost metric

RIP is suitable for large networks

RIP uses hop counts as the cost metric.

Which of the following best describes OSPF?

OSPF is a classful distance vector routing protocol.

OSPF is a classless link-state routing protocol.

OSPF is a classful link-state routing protocol.

OSPF is a classless distance vector routing protocol.

OSPF is a classless link-state routing protocol.

What information does the next hop entry in a routing table identify?

The first router in the path to the destination network.

A router is connected to the network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0.
The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Forward the packet to the next hop router specified by the rout to network 0.0.0.0.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet.

You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?

IGP

Which of the following is a characteristic of static routing when compared to dynamic routing?

All routes must be manually updated on the router.

You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?

Manually reconfigure the default route to point to the new next hop router.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?

Wait for convergence to take place.

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?

Convergence

Which two of the following tasks do routers perform?

Route data based on logical network addresses. Maintain information about paths through an internetwork

Drag the collision domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.

Drag
Single collision domain
Multiple collision domains

Drop
Hub, Switch, 802.11n wireless access point,
router, bridge, repeater, layer 3 switch

Hub – Single collision domain Switch – Multiple collision domain 802.11n wireless access point – Single collision domain Router – Multiple collision domains Bridge – Multiple collision domain Repeater – Single collision domain Layer 3 switch – Multiple collision domains

What is the primary purpose of gateway redundancy?

To overcome a single point of failure on the next hop router.

Which of the following protocols provide gateway redundancy? (Select all that apply.)

HSRP, VRRP, GLBP

Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets?

Route summarization

Match the default administrative distance with the route type.

Drag
0
1
5
90
100
110
120
170

Drop
IGRP
RIP
Static Route
EIGRP Internal Route
OSPF
EIGRP Summary Route
Connected Interface
EIGRP External Route

100,120,1,90,110,5,0,170

When multiple routes to a destination exist, what is used to select the best possible route?

Metric

Which of the following routing protocols uses relative link cost as the metric?

OSPF

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?

BGP

Which of the following are true for the IS-IS routing protocol? (Select two.)

Divides large networks into areas. Supports IPv6 routing.

Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company’s network and the third-party’s network to be connected via a dedicated WAN connection. As you prepare for the connection, you encounter a problem. The two networks need to be able to exchange routing information, but they use different routing protocols. The third-party organization uses RIP, and your network uses OSPF. What should you do to allow routing information to be exchanged?

Configure a border router to use route redistribution.

In virtualization, what is the role of the hypervisor?

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

What type of virtualization completely simulates a real physical host?

Full virtualization

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) and One virtual switch

The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.

Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with

Device Port Port Assignment
Virtual switch P1 Virtual Network1
P2 Virtual Network1
P3 Virtual Network1
P4 Physical Network
P5 Physical Network
Physical Switch P1 Physical Network
P2 Physical Network
P3 Physical Network
P4 Physical Network
P5 Physical Network

Virtual Network
Virtual OS1 -&gt;P1 -&gt; Virtual Switch
Virtual OS2 -&gt; P2 -&gt; Virtual Switch
Virtual OS3 -&gt; P3 -&gt; Virtual Switch
Virtual OS4 -&gt; P4 -&gt; Virtual Switch
Virtual Switch -&gt; P5 -&gt; P1 -&gt; Physical Switch

Physical Network
Physical OS1 -&gt; P2 -&gt; Physical Switch
Physical OS2 -&gt; P3 -&gt; Physical Switch
Physical OS3 -&gt; P4 -&gt; Physical Switch
Physical OS4 -&gt; P5 -&gt; Physical Switch
Physical Switch -&gt; P1 -&gt; P5 -&gt; Virtual Switch

Virtual OS2, Virtual OS3

You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?

Virtual Servers

Which component is most likely to allow physical and virtual machines to communicate with each other?

Host operating system
VHD
Virtual switch
Virtual desktop

Virtual switch

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) and One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configurations for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with.

Device Port Port Assignment
Virtual Switch P1 Virtual Network1
P2 Virtual Network2
P3 Virtual Network1
P4 Virtual Network2
P5 Virtual Network1, Physical Network
Physical Switch P1 Physical Network
P2 Physical Network
P3 Physical Network
P4 Physical Network
P5 Physical Network

Virtual OS3, Physical OS1, Physical OS2, Physical OS3, Physical OS4

Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?

DaaS (Data)
PaaS (Platform)
SaaS (Software)
IaaS (infrastructure)

SaaS (Software as a Service

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

Which of the following is not true regarding cloud computing?

The term cloud is used as a metaphor for the internet

Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the service.

Cloud computing is software, data access, computation, and storage services provide to clients through the Internet.

Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like web browser.

Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services

Match each description on the left with the appropriate cloud technology on the right.

Drag

Provides cloud services to just about anyone

Allows cloud services to be shared by several organizations.

Integrates one cloud service with other cloud services.

Provides cloud services to a single organization

Drop

Public Cloud

Private Cloud

Community Cloud

Hybrid Cloud

Public Cloud – Provides clouds services to just about anyone. Private Cloud – Provides cloud services to a single organization Community Cloud – Allows cloud services to be shared by several organizations. Hybrid Cloud – Integrates one cloud service with other cloud services.

Which of the following are advantages of virtualization (Select two.)

Centralized administration
Redundancy of hardware components for fault tolerance
Easy migration of systems to different hardware
Reduced utilization of hardware resources
Improved detection of host based attacks

Centralized administration, easy migration of systems to different hardware.

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems versions and editions. Currently, all of our testing virtual machines are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application ou are working on could adversely impact other network hosts if errors exist in the code. To prevent this you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do?

Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for host-only (internal) networking.

Match the virtualization feature on the right with the appropriate description on the left.

Drag – 1 Moving virtual machines between hypervisor hosts.
2 Verifying that security controls are working as designed.
3 Performing a physical-to-virtual migration (P2V)
4 Isolating a virtual machine from the physical network

Drop – Flexibility, testing, server consolidation, sandboxing

1,2,3,4

You are responsible for maintaining windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do?

Create a new virtual switch configured for bridged (external networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?

iSCSI Initiator

What key advantage does a virtual router have over physical router?

Multiple networks can be connected to single interface.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

Which of the following statements about virtual NIC’s are true? (Select two)

Virtual NIC’s need the appropriate driver installed to funciton

Virtual NIC’s dont have a MAC address.

Multiple virtual NIC’s can be added to a virtual machine

The type of NIC installed on a physical machine determines the type of virtual NIC that is emulated

Virtual NICs can communicate only with other virtual NICs

Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine

Arrange the Fiber Channel SAN implementation tasks in the order they should be performed.

1 Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives
2 Deploy a Fiber Channel switch
3 Install a Fiber Channel adapter in each server that will access the share storage on the SAN
4 Connect each server to the Fiber channel switch using the appropriate fiber optic cabling for the equipment you are using.

3241

Which of the following does not accurately describe an iSCSI SAN?

Uses port 3260 by default

Requires special hardware and knowledge to implement

Requires special hardware and knowledge to implement

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending