performance optimization
pdf
keyboard_arrow_up
School
Western Governors University *
*We aren’t endorsed by this school
Course
841
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
4
Uploaded by camylikobe
•
performance optimization
Explanation
OBJ-4.1: Voice over Internet Protocol (VoIP) performance optimization can help a business
improve the quality of its video and audio communications over the Internet by decreasing the
size of the broadcast domain through the creation of VLANs. Each VLAN can contain the VoIP
devices for a single department or business unit, and traffic is routed between the VLANs using
layer 3 multilayer switches to increase the performance of the voice communication systems.
Performance optimization helps companies bolster the availability, accessibility, security, and
overall performance of their networks. Compliance enforcement involves dividing up one
network into smaller sections to better control the flow of traffic across the network and to
restrict confidential data to a specific network segment based on a specific regulation or
contractual requirement, such as PCI DSS segmentation requirements. A honeynet is an
intentionally vulnerable network segment that is used to observe and investigate the attack
techniques of a hacker or adversary. Separate public/private networking involves segmenting the
network into two portions: public and private. This is often used in cloud architectures to protect
private data.
Question 70:
Incorrect
You are working as part of a network installation team. Your team has been asked to
install Cat 5e cabling to some new offices on the building's second floor. Currently, the
office only has one network closet, which is located on the first floor. Your team spent the
morning running 24 new CAT 5e cables from a patch panel in the networking closet on the
first floor to a new networking closet you are outfitting on the second floor. Your team
terminated these cables in a new patch panel in the 2nd-floor closet. You measured the
distance from the switch in the 1st-floor closet to the new 2nd-floor patch panel and
determined it was 80 meters. The team then ran cables from this patch panel to each of the
new offices. Some of the offices are working properly, but others are not. You suspect that
some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What
is the BEST solution to this problem?
•
install a switch in the SECOND FLOOR networking closet TO INCREASE THE
SIGNAL
Explanation
OBJ-5.2: The best option is to install a switch in the networking closet on the second floor,
connecting to the cables coming from the first-floor closet and then to the cables on the second-
floor patch panel. This will act as a repeater to boost the signal strength over the Cat5e cable,
effectively resetting the cable length to 0 meters before leaving the closet. While a repeater may
be a good option, a switch is more effective in this case since there are so many cables, and
repeaters usually only work for an individual cable. A hub would similarly work but would
introduce a signal domain for all 24 computers. This would drastically decrease the performance
of the network. Finally, we don't want to include a switch in each office, as this is a bad security
practice and an inefficient use of resources. It is easier to manage and administer a single,
centralized switch in the network closet.
Question 71:
Correct
Which media access control technology will listen to a cable to ensure there is no traffic
being transmitted before sending its traffic but will implement a back-off timer if a
collision does occur?
•
CSMA/CD
Explanation
OBJ-2.3: In networking technologies that use CSMA/CD as their access method, a device first
listens to the network media to make sure there is no signal already present from another device
before it tries to place its own signal on the media. If a carrier signal is detected on the media,
which indicates that a device is currently transmitting a signal, no other device can initiate a
transmission until the carrier stops. If no carrier is detected, any device can transmit a signal. If
two devices listen to the wire and detect no carrier signal, they may decide to send signals
simultaneously. If this happens, a collision occurs between the two signals generated. Next, both
devices detect the collision and stop transmitting their signals immediately, sending out a
jamming signal that informs all other devices on the network that a collision has occurred and
should not transmit. Meanwhile, the two devices whose signals created the collision cease
transmitting and wait for random intervals of time (usually a few milliseconds) before attempting
to retransmit.
Question 72:
Correct
Which of the following is a DNS record type?
•
PTR
Explanation
OBJ-1.6: There are several types of DNS records, including A, AAAA, CNAME, PTR, SVR,
and TXT. PTR records are used for the Reverse DNS (Domain Name System) lookup. Using the
IP address, you can get the associated domain/hostname. An A record should exist for every PTR
record. Time to live (TTL) or hop limit is a mechanism which limits the lifespan or lifetime of
data in a computer or network. The Dynamic Host Configuration Protocol (DHCP) is a network
management protocol used on Internet Protocol networks for automatically assigning IP
addresses and other communication parameters to devices connected to the network using a
client-server architecture. The Lightweight Directory Access Protocol (LDAP) is an open,
vendor-neutral, industry standard application protocol for accessing and maintaining distributed
directory information services over an Internet Protocol network.
Question 73:
Correct
Which encryption type MOST likely is used for securing the key exchange during a client-
to-server VPN connection?
•
ISAKMP
Explanation
OBJ-4.4: ISAKMP is used in IPsec, which is commonly used in securing the key exchange
during the establishment of a client-to-server VPN connection. TKIP (Temporal Key Integrity
Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless
LANs (WLANs). Kerberos is a computer network authentication protocol that works based on
tickets to allow nodes communicating over a non-secure network to prove their identity to one
another in a secure manner. The Advanced Encryption Standard (AES) is a symmetric key
encryption and is not used for key exchanges.
Question 74:
Correct
Which of the following policies or plans would dictate the complexity requirements for a
wireless network's shared secret key?
•
A password policy
Explanation
OBJ-3.2: A password policy is a set of rules created to improve computer security by motivating
users to create dependable, secure passwords and then store and utilize them properly. This
document promotes strong passwords by specifying a minimum password length, complexity
requirements, requiring periodic password changes, and placing limits on the reuse of passwords.
An acceptable use policy (AUP) is a set of rules applied by the owner, creator, or administrator
of a network, website, or service, that restrict how the network, website, or system may be used
and sets guidelines as to how it should be used. A data loss prevention policy is a document that
defines how organizations can share and protect data. It guides how data can be used in decision-
making without it being exposed to anyone who should not have access to it. The goal of a data
loss prevention policy is to minimize accidental or malicious data loss. A remote access policy is
a document that outlines and defines acceptable methods of remotely connecting to the internal
network.
Question 75:
Correct
A technician has been troubleshooting a network problem, has determined the likely cause
of the issue, and implemented a solution. What is the NEXT step they should perform
according to the CompTIA troubleshooting methodology?
•
verify full system functionality
Explanation
OBJ-5.1: The next step would be to "verify full system functionality and, if applicable,
implement preventive measures" since you just finished the "implement a solution or escalate as
necessary" step. The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory
of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to
resolve the problem and identify potential effects, (5) Implement the solution or escalate as
necessary, (6) Verify full system functionality and if applicable implement preventative
measures, and (7) Document findings, actions, outcomes, and lessons learned.
Question 76:
Correct
What is considered a classless routing protocol?
•
OSPF
Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
OBJ-2.2:
OSPF
is known as a classless protocol. Classless routing protocols are those protocols
that include the subnet mask information when the routing tables or updates are exchanged.
Other classless routing protocols include EIGRP, RIPv2 (or newer), and IS-IS.
Question 77:
Incorrect
Which of the following levels would an alert condition generate?
•
1
Explanation
OBJ-3.1: The severity levels range from zero to seven, with zero being the most severe and
seven being the least severe. Level 0 is used for an emergency and is considered the most severe
condition because the system has become unstable. Level 1 is used for an alert condition and
means that there is a condition that should be corrected immediately. Level 2 is used for a critical
condition, and it means that there is a failure in the system’s primary application and it requires
immediate attention. Level 3 is used for an error condition, and it means that something is
happening to the system that is preventing the proper function. Level 4 is used for warning
conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used
for notice conditions and it means that the events are unusual, but they are not error conditions.
Level 6 is used for information conditions and it is a normal operational message that requires no
action. Level 7 is used for debugging conditions and is just information that is useful to
developers as they are debugging their networks and applications.
Question 78:
Correct
You are assisting a member of Dion Training's security team during an incident response.
The team member asks you to determine if any strange TCP connections are occurring on
a given workstation. You open the command prompt on the workstation. Which of the
following tools would provide you with information on any TCP connections currently
established on the workstation?