Quiz 6 NP6

pdf

School

Butler Community College *

*We aren’t endorsed by this school

Course

212

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

39

Uploaded by ChefFogDinosaur5

Report
IT 212 Module 6 Quiz - NP6.0 Candidate: Marques Townsend (mtownz11) Date: 2/15/2024, 4:46:42 AM • Time Spent: 14:07 Score: 100% Passing Score: 65% Question 1. Correct Which TCP/IP utility gives the following output? arp -a ipconfig ifconfig ping Explanation The ping command displays the results of four echo request/reply contacts with a destination host. Use the ifconfig command to show you the TCP/IP configuration for a Linux computer. ipconfig is a utility used to obtain TCP/IP configuration on Windows systems. Use the arp command to view the MAC addresses associated with IP addresses that the local workstation has contacted recently. The -a switch shows current ARP cache tables. References 4.9.1 IP Configuration Troubleshooting 4.9.4 IP Configuration Troubleshooting Facts 4.10.1 Network Communication Troubleshooting
4.10.2 Use ping and tracert 4.10.3 Network Communication Troubleshooting Facts 4.11.1 DNS Troubleshooting 4.11.2 DNS Troubleshooting Facts 14.3.1 Command Line Troubleshooting Utilities 14.3.2 Command Line Troubleshooting Utility Facts q_cli_utilities_ping_02_np6.question.fex Question 2. Correct Which of the following are benefits that a VPN provides? (Select two.) Cost savings Easy setup Faster connection Compatibility Metering Explanation Benefits provided by VPNs include the following:
Benefits provided by VPNs include the following: Cost savings - VPNs reduce connectivity costs while increasing remote connection bandwidth. Security - by using appropriate encryption and authentication protocols, data being transmitted across the VPN can be secured from prying eyes. Scalability - because VPNs use the internet, you can add additional users without adding significant infrastructure. Compatibility - you can implement VPNs across many different WAN types, including broadband technologies. A faster connection is not a benefit provided by a VPN. VPN connections are usually a bit slower. While setting up a VPN isn't necessarily difficult, it does require a few extra steps and setup. Easy setup and configuration is not considered a benefit of a VPN. Service metering is an advantage of cloud computing. References 8.5.4 Virtual Private Networks 8.5.5 Virtual Private Networks Facts 8.5.6 IPsec Virtual Private Networks Facts q_cloud_vpn_benefits_np6.question.fex Question 3. Correct Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal? Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection. Install antivirus software on the Windows 2000 workstations, and configure them to automatically download and install updates. Implement a host-based firewall on each Windows 2000 workstation, and configure them to automatically download and install updates. Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. Explanation The best solution is to place the Windows 2000 workstations in their own VLAN. If you use VLAN network segmentation, the workstations will still have access to the internet, but network access can be heavily restricted. This greatly reduces the damage a workstation can cause if it were to become compromised again. Legacy operating systems, such as Windows 2000, are easy targets for attackers. This is because these operating systems use outdated protocols and have known exploits. Installing antivirus software or a host-based firewall would do very little to protect the entire network. In addition, legacy operating system are no longer supported with updates or patches, so enabling automatic updates would offer no benefit. Creating a dedicated network for the workstations would affect normal operations and also increase the network management load.
increase the network management load. References 14.1.1 Optimization 14.1.3 Optimization Facts 14.2.3 Common Network Issues 14.2.4 Common Network Issues Facts q_optimization_vlan_np6.question.fex Question 4. Correct You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution.) Connect the virtual network interfaces in the virtual machines to the virtual switch. Disconnect the network cable from the hypervisor's network interface. Create a new virtual switch configured for host-only (internal) networking. Create a new virtual switch configured for bridged (external) networking. Disable the switch port that the hypervisor's network interface is connected to.
Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces. Explanation To allow the virtual machines to communicate with each other while isolating them from the production network, complete the following: Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Creating a bridged virtual switch would still allow the virtual machines to communicate on the production network through the hypervisor's network interface. Disconnecting the hypervisor's network cable, blocking the virtual machine's MAC addresses, or disabling the hypervisor's switch port would isolate the virtual machines from the production network, but this would also prevent them from communicating with each other. References 8.3.1 Virtualization Overview 8.3.2 Create a Virtual Machine 8.3.3 Virtualization Facts 8.4.1 Virtual Networking Implementations 8.4.2 Virtual Network Devices 8.4.3 Configure Virtual Network Devices 8.4.4 Virtual Networking Facts 8.4.5 Virtualization Implementation Facts q_virt_networking_switch_03_np6.question.fex Question 5. Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Define VLAN memberships on each VM. Create a virtual router with VRF technology. Implement a virtual firewall within the hypervisor. Route VM-to-VM traffic through a physical firewall and back to the virtual network. Explanation Virtualized hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. By implementing a virtual firewall within the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows between virtual machines. While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient. A virtual router with VRF (Virtual Route Forwarding) is used to create multiple networks from a single router interface. Configuring VLAN membership would not allow you to monitor and filter traffic. References 8.4.4 Virtual Networking Facts q_virt_networking_firewall_np6.question.fex Question 6. Correct Which of the following are IPsec modes of operation? (Select two.) Multimode Single mode
Tunnel mode Transport mode Secure mode Explanation Tunnel mode and transport mode are the two IPsec modes of operation. Single mode and multimode are types of fiber optic network cable. Secure mode is a wireless LAN setting. References 8.5.4 Virtual Private Networks 8.5.5 Virtual Private Networks Facts 8.5.6 IPsec Virtual Private Networks Facts q_ipsec_vpn_mode_np6.question.fex Question 7. Correct Which of the following are true regarding cloud computing? (Select three.) Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet. Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser. The term cloud is used as a synonym for the internet. Cloud computing requires end user knowledge of the delivery system's physical location and configuration.
configuration. Explanation Cloud computing does not require end user knowledge of the delivery system's physical location and configuration. Other cloud computing details include the following: Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet. The term cloud is used as a synonym for the internet. This is based on the basic cloud drawing used to represent the telephone network infrastructure and the internet in computer network diagrams. Typical cloud computing providers deliver common business applications online that are accessed from another web service or software, like a web browser. The software and data are stored on servers. References 8.5.3 Cloud Facts q_cloud_computing_mp6.question.fex Question 8. Correct Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site? Site-to-site IPsec VPN Remote access VPN SSL VPN GRE over IPsec Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Site-to-site IPsec VPNs connect networks across an untrusted network, such as the internet. The VPN gateway encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site. Clients send and receive normal unencrypted TCP/IP traffic through a VPN gateway. The receiving VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network. SSL VPNs use a PKI (public key infrastructure) and digital certificates to authenticate peers. GRE over IPsec (Generic Routing Encapsulation over IPsec) does not support encryption. Remote access VPNs let remote and mobile users connect to an organizational network securely. References 8.5.4 Virtual Private Networks 8.5.5 Virtual Private Networks Facts 8.5.6 IPsec Virtual Private Networks Facts q_cloud_vpn_ipsec_np6.question.fex Question 9. Correct Which of the following statements are true about virtual NICs? (Select two.) Virtual NICs need the appropriate driver to function. The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated. Virtual NICs can only communicate with other virtual NICs.
virtual NICs. Virtual NICs don't have a MAC address. Multiple virtual NICs can be added to a virtual machine. Explanation Within each virtual machine, you can configure one or more virtual network interfaces, which function similarly to physical network interfaces. Virtual interfaces use Ethernet standards to transmit and receive frames on a network. The operating system within the virtual machine must have the appropriate driver installed to support the virtual network interface, just as with a physical network interface. When you configure a virtual network interface within a virtual machine's configuration, you can specify: The type of physical network interface to emulate. This allows the best possible driver support from the operating system within the virtual machine. A MAC address. Most hypervisors automatically assign a MAC address to each virtual network interface. Some hypervisors allow you to use a custom MAC address if needed. The network to connect to. Most hypervisors allow you to define many different virtual networks. When you configure a virtual network interface, you select which virtual network you want it to connect to. References 8.3.1 Virtualization Overview 8.3.2 Create a Virtual Machine 8.4.1 Virtual Networking Implementations 8.4.2 Virtual Network Devices 8.4.3 Configure Virtual Network Devices 8.4.4 Virtual Networking Facts 8.4.5 Virtualization Implementation Facts q_virt_networking_nic_np6.question.fex
Question 10. Correct What is a VPN (virtual private network) primarily used for? Support the distribution of public web documents. Support secure communications over an untrusted network. Allow remote systems to save on long distance charges. Allow the use of network-attached printers. Explanation A VPN (virtual private network) is primarily used to support secure communications over an untrusted network. You can use a VPN over a local area network, across a WAN connection, over the internet, and even between a client and a server over a dial-up internet connection. All of the other items listed in this question are benefits or capabilities that are secondary to this primary purpose. References 8.5.4 Virtual Private Networks 8.5.5 Virtual Private Networks Facts 8.5.6 IPsec Virtual Private Networks Facts q_cloud_vpn_secure_np6.question.fex Question 11. Correct A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next? Identify the affected areas. Apply the patch to the router. Identify possible side effects of the solution. Document the problem and the solution. Explanation Based on the troubleshooting process, you should create an action plan and identify possible side effects of implementing the solution. For example, you might consider how long the router will be offline to apply the patch, how long it will take to implement the solution, and which problems might occur during the process. Take the action to fix the problem only after you have created the plan, identified the side effects, and determined the best time to implement the fix. Document the solution after the problem is fixed and verified. Identifying the affected areas is part of the process you take before arriving at a probable solution. References 14.2.1 Troubleshooting Methodology 14.2.2 Troubleshooting Methodology Facts q_trouble_meth_solution_np6.question.fex Question 12. Correct You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You
plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will run through the suspended tile ceiling in the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device on the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.) You should not run a plenum cable through a suspended tile ceiling. You must use a straight-through cable to connect the two switches together. You should implement redundant power supplies for the network devices. You should implement a UPS between the wall outlet and the network devices. You should not connect networking equipment to a 20-amp wall circuit. Explanation In this scenario, all the devices on the new rack will go down if the power from the wall outlet fails for some reason (such as a power outage). To prevent this from happening, you should implement a UPS between the wall outlets and the network devices. In addition, the power supplies used by computing equipment have finite life spans and fail frequently.
Because these are mission-critical devices, you should consider implementing redundant power supplies. Plenum network cabling is specifically designed to run through a suspended tile ceiling. The space between the suspended tile and the physical ceiling is called a ceiling plenum. In the early days of networking, crossover cables were required to uplink two hubs or switches together. However, most modern switches implement auto-MDIX, which detects whether crossover is required and automatically configures the interface, allowing you to use either a crossover or straight-through cable. Using a 20-amp circuit for networking equipment is considered a data center best practice. Connecting too many devices to a standard 15-amp wall circuit can overload it and trip its breaker. References 11.6.4 Power Management 11.6.5 Power Management Facts 11.6.6 Configure UPS Settings q_pwr_prot_ups_02_np6.question.fex Question 13. Correct Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next? Fix the problem. Create an action plan. Determine if escalation is needed. Document the problem. Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
After identifying the most probable cause, escalate the problem if it is beyond your ability to fix or if it is out of your scope of management. For example, the problem might be on a router configuration that you are not authorized to correct. When forwarding the problem on to someone else, be sure to describe the nature of the problem, the actions you have already taken, and the symptoms that lead you to believe the problem is outside of your area of responsibility. If you decide that escalation is not necessary, you can then create an action plan that includes the fix and identify possible side effects of implementing it. After the solution has been implemented, verify that it works and that there were no unforeseen consequences. Finally, document the problem and the solution. References 14.2.1 Troubleshooting Methodology 14.2.2 Troubleshooting Methodology Facts q_trouble_meth_escalation_np6.question.fex Question 14. Correct Which TCP/IP utility gives you the following output?
ipconfig netstat -a arp -a ping Explanation The ipconfig command shows a computer's TCP/IP configuration information. netstat -a shows you the status of all connections and listening ports. The ping command shows you the results of four echo request/reply contacts with a destination host. The arp -a switch shows you current ARP cache tables. References 4.9.1 IP Configuration Troubleshooting 4.9.2 Use ipconfig 4.9.3 Use the ip Command 4.9.4 IP Configuration Troubleshooting Facts 4.10.1 Network Communication Troubleshooting 4.11.2 DNS Troubleshooting Facts 14.3.1 Command Line Troubleshooting Utilities 14.3.2 Command Line Troubleshooting Utility Facts q_cli_utilities_ipconfig_02_np6.question.fex
q_cli_utilities_ipconfig_02_np6.question.fex Question 15. Correct You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? IPS Packet sniffer Port scanner IDS System logs Explanation Use a port scanner to check for open ports on a system or firewall. Compare the list of opened ports with the list of ports allowed by your network design and security policy. Typically, a port is opened when a service starts or is configured on a device. Open ports for unused services expose the server to attacks directed towards that port. Use a packet sniffer to examine packets on your network. With a packet sniffer, you can identify packets directed towards specific ports, but you won't be able to tell if those ports are open. Examine system logs to look for events that have happened on a system, which might include a service starting, but would not likely reflect open ports. An intrusion detection system (IDS) is a special network device that can detect attacks and suspicious activity. A passive IDS monitors, logs, and detects security breaches, but takes no action to stop or prevent the attack. An active IDS (also called an intrusion protection system, or IPS) performs the functions of an IDS, but it can also react when security breaches occur. References 11.4.2 Protocol Analyzers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11.4.2 Protocol Analyzers 14.3.5 Software Troubleshooting Utilities 14.3.6 Software Troubleshooting Utilities Facts 14.3.7 Troubleshoot with Wireshark q_software_utilities_port_scanner_np6.question.fex Question 16. Correct You manage your company's website, which uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure on a single component doesn't cause the website to become unavailable. What should you add to your configuration to accomplish this? On each server, add a second network connection to the internet. Reconfigure the disk array in a RAID 1+0 configuration. On each server, add a second network connection to connect the server to the shared storage device. Connect one server to the internet through a different ISP. Explanation In this scenario, the ISP is the single point of failure. If the ISP connection goes down, the website will be unavailable. Connecting one server to a different ISP or both servers to two ISPs provides redundancy for the connection. Adding multiple network connections to the shared storage or the same ISP is unnecessary because if the single network connection on one server fails, the other server will still be available. Reconfiguring the storage as a RAID 1+0 allows multiple disk failures, but RAID 1 can sustain a failure on a single disk.
can sustain a failure on a single disk. References 11.6.3 Redundancy and High Availability Facts q_redundancy_avail_ips_np6.question.fex Question 17. Correct IPsec is implemented through two separate protocols. What are these protocols called? (Select two.) L2TP AH EPS ESP SSL Explanation IPsec is implemented through two separate protocols, which are called Authentication Header (AH) and Encapsulating Security Payload (ESP). AH provides authentication and non-repudiation services to verify that the sender is genuine and that the data was not modified in transit. ESP provides data encryption services for the data within the packet. SSL and L2TP are not protocols associated with IPsec. References 8.5.4 Virtual Private Networks 8.5.5 Virtual Private Networks Facts 8.5.6 IPsec Virtual Private Networks Facts q_ipsec_vpn_ah_esp_np6.question.fex
Question 18. Correct With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 filter? Only packets with 192.168.0.34 in the destination address are captured. Only packets on the 192.168.0.34 network are captured. Only packets with 192.168.0.34 in either the source or destination address are captured. Only packets with 192.168.0.34 in the source address are captured. Explanation Wireshark's host filter lets you only capture where the specified IP address is in either the source or the destination address. The IP address of 192.168.0.34 is a specific address for an individual device. It is not an address for the entire network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
address for the entire network. References 11.4.2 Protocol Analyzers 14.3.5 Software Troubleshooting Utilities 14.3.6 Software Troubleshooting Utilities Facts 14.3.8 Use Wireshark to Troubleshoot Network Issues 14.3.10 Wireshark Facts q_trouble_wireshark_filter_02_np6.question.fex Question 19. Correct Which key advantage does a virtual router have over a physical router? It has faster routing performance. Multiple networks can connect to a single interface. Routing protocols are not necessary for routing data between networks. It allows Virtual Router Redundancy Protocol (VRRP). Explanation The key advantage to a virtual router is that it can support multiple networks on a single router interface. A virtual router does this by using a different routing table for each network. Physical routers are limited to a single network on each interface. Like physical routers, virtual routers use routing protocols to route data between networks. VRRP is used by physical routers to specify backup routers in the case of failure. Virtual routers do not offer significant performance increases. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References 8.4.4 Virtual Networking Facts q_virt_networking_router_np6.question.fex Question 20. Correct Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? Layer 1 switch Layer 2 switch Unmanaged switch Multilayer switch Explanation A multilayer switch uses specialized hardware called an application-specific integrated circuit (ASIC) to perform switching functions in hardware rather than using the CPU and software. ASIC allows switches to perform the switching function at wire speed. Layer 2 switches use the CPU and software to forward frames. Unmanaged switches are also called Layer 2 switches. A Layer 1 switch is another name for a hub, which does not perform any traffic inspection. Rather, the switch sends out received packets on all ports. References 14.1.3 Optimization Facts q_optimization_multilayer_np6.question.fex Question 21. Correct What is the purpose of using Ethernet bonding? (Select two.) Increases read and write operations between
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Increases read and write operations between the system bus and network adapters Provides a failover solution for network adapters Provides increased bus speeds Increases network performance Enables dual remote access (DRA) over a WAN link Explanation For a true fault-tolerant strategy, you must consider all system components. Ethernet bonding (also called adapter teaming) is a fault-tolerant strategy that uses multiple network adapters configured on a failover solution. In the event of a NIC failure, other adapters automatically provide link redundancy. Multiple adapters can also increase performance by distributing the network load between adapters. Ethernet bonding does not provide increased bus speeds, increase read and write operations between the system bus and network adapters, or enable dual remote access (DRA) over a WAN link. References 11.6.3 Redundancy and High Availability Facts 11.6.8 Set Up NIC Teaming 11.6.10 Configure Linux Network Bonding 11.6.11 NIC Teaming Facts q_nic_teaming_bonding_01_np6.question.fex Question 22. Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS on the rack along with redundant power supplies for the server. Will this configuration work? No, you must implement the UPS and power supplies on the rack externally. No, you should not use blade servers for virtualization. No, you should not run a cable across the data center floor. Yes, this configuration complies with data center best practices. No, you must use a cross-over cable to connect the two switches together. Explanation In this scenario, running a cable across the data center floor represents a tripping hazard. It also represents a point of failure, as the cable will be walked on constantly, resulting in it being kicked out of one or both jacks. It will also likely fail prematurely due to the excessive wear. A better option would be to run the cable through the ceiling plenum. Blade servers work well for virtualization as long as they meet the system requirements for the hypervisor software. In the early days of networking, crossover cables were required to uplink two hubs or switches together. However, most modern switches implement auto- MDIX, which detects whether crossover is required and automatically configures the interface for you, making a crossover cable unnecessary. Rack-mounted power supplies and UPS devices are commonly used in data centers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References 11.6.4 Power Management 11.6.5 Power Management Facts 11.6.6 Configure UPS Settings q_pwr_prot_ups_01_np6.question.fex Question 23. Correct Why should you store backup media off site? To prevent the same disaster from affecting both the network and the backup media To reduce the possibility of theft To make the restoration process more efficient To comply with government regulations Explanation Backup media should be stored off site to prevent the same disaster from affecting the network and the backup media. If your primary facility is destroyed, your only hope of recovery is off site data storage. Off site storage does not significantly reduce the possibility of media theft because it can be stolen while in transit or at your storage location. Off site storage is not a government regulation. Off site storage does not make the restoration process more efficient because additional time is spent retrieving backup media from the offsite storage location. References 11.6.3 Redundancy and High Availability Facts q_redundancy_avail_offsite_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 24. Correct While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network? nslookup traceroute ifconfig tracert Explanation traceroute is a Linux utility that allows you to track a packet's route as it traverses the network. The traceroute utility is used on Linux systems, while tracert is used on Windows systems. ifconfig is a utility used to obtain TCP/IP configuration on Linux systems. nslookup is a utility used to perform manual DNS lookups on Windows systems. References 4.10.2 Use ping and tracert 4.10.3 Network Communication Troubleshooting Facts 4.11.1 DNS Troubleshooting 4.11.2 DNS Troubleshooting Facts 14.3.1 Command Line Troubleshooting Utilities 14.3.2 Command Line Troubleshooting Utility Facts q_cli_utilities_traceroute_np6.question.fex Question 25. Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model should you use? PaaS IaaS IaC SaaS Explanation Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment. Software as a Service (SaaS) delivers software applications to the client either over the internet or on a local area network. Platform as a Service (PaaS) delivers everything a developer needs to build an application on to the cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Infrastructure as Code (IaC) provides IT infrastructure management using config files. However, it does not provide the features or support required by the company in this scenario. References 8.5.3 Cloud Facts q_cloud_iaas_mp6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 26. Correct In addition to performing regular backups, what must you do to protect your system from data loss? Restrict restoration privileges to system administrators. Regularly test restoration procedures. Write-protect all backup media. Store the backup media in an on-site fireproof vault. Explanation The only way to ensure that you have protection against data loss is to regularly test your restoration procedures. This activity reveals whether or not your backup process functions properly and your restoration and recovery procedures are accurate. It's a good idea to store backup media in a fireproof vault, but it's a better idea to store it off site. You should restrict restoration privileges to trusted staff to prevent confidentiality violations. However, this does not address the issue of data loss protection. Write-protecting backup media provides little real security for the stored data because anyone can flip the switch on the media to remove the protection. References 11.6.3 Redundancy and High Availability Facts q_redundancy_avail_restore_np6.question.fex Question 27. Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Which of the following is the least effective power loss protection for computer systems? Uninterruptible power supply Backup power generator Surge protector Secondary power source Explanation A surge protector provides no power loss protection. A UPS, a secondary power source, and a backup power generator all provide reasonable protection from power loss. References 11.6.5 Power Management Facts q_pwr_prot_surge_np6.question.fex Question 28. Correct Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? An application-specific integrated circuit Ethernet bonding A caching engine A traffic shaper Explanation Switches use specialized hardware called an application-specific integrated circuit (ASIC), which performs switching functions in hardware rather than using the CPU and software. ASIC allows switches to perform the switching function at wire speed. Caching engines store frequently accessed content for faster access. Content is retrieved
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Caching engines store frequently accessed content for faster access. Content is retrieved from the local network instead of the internet. Ethernet bonding creates two or more physical connections to the same network by bonding NICs or switch ports together. Ethernet bonding provides increased performance and some fault tolerance. A traffic shaper (also called a bandwidth shaper) is a device that's capable of modifying the flow of data through a network. This happens in response to network traffic conditions. References 14.1.1 Optimization 14.1.3 Optimization Facts 14.2.3 Common Network Issues 14.2.4 Common Network Issues Facts q_optimization_circuit_np6.question.fex Question 29. Correct Which of the following devices accepts incoming client requests and distributes those requests to specific servers? CSU/DSU Load balancer Media converter Caching engine Explanation A load balancer is a device that accepts incoming client requests and distributes those requests to multiple servers. One goal of load balancing is to distribute client requests evenly between multiple servers to improve performance. A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the signal received from the WAN provider into a signal that can be used by equipment at the customer site. An intrusion prevention system (IPS) can detect and respond to security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
customer site. An intrusion prevention system (IPS) can detect and respond to security events. A caching engine saves copies of frequently used content, eliminating the need to download the content each time it's requested. A media converter converts signals used on one media type (such as twisted-pair Ethernet) to another media type (such as fiber optic). References 11.6.3 Redundancy and High Availability Facts 11.6.11 NIC Teaming Facts 11.6.12 Configure a Load Balancing Server q_nic_teaming_balancer_np6.question.fex Question 30. Correct You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task? Data encryption using PKI Virtual private network (VPN) Port security Network segmentation Explanation Implementing network segmentation would isolate the remediation server from the rest of the network while still allowing the remediation server to contact the NAP infrastructure. A virtual private network (VPN) creates a secure connection between two hosts or two sites
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
A virtual private network (VPN) creates a secure connection between two hosts or two sites over an unsecured network. Encrypting data transmissions using PKI would only protect transmitted data, not isolate the remediation network. Port security identifies allowed and denied devices that connect to a switch port. Doing this would not isolate the remediation network. References 14.1.1 Optimization 14.1.3 Optimization Facts 14.2.3 Common Network Issues 14.2.4 Common Network Issues Facts q_optimization_segmentation_np6.question.fex Question 31. Correct Examine the following output: Active Connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost:4832 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output? netstat ifconfig dig nslookup
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
nslookup Explanation The netstat command produced the output. netstat reports the TCP/IP ports that are open on the local system, as well as identifying the protocol and remote host connected to that port. This information can be very useful when looking for security weaknesses, as a TCP/IP port that's open to traffic unnecessarily represents a security risk. ifconfig is a tool used on Unix, Linux, and Macintosh systems to view the configuration of network interfaces, including TCP/IP network settings. The dig command allows you to perform manual DNS lookups from a Linux or Unix system. This can be very useful when troubleshooting name resolution issues. nslookup allows you to perform manual DNS lookups from a Windows system. References 4.10.4 Use arp and netstat 4.10.5 arp and netstat Facts 14.3.1 Command Line Troubleshooting Utilities 14.3.2 Command Line Troubleshooting Utility Facts q_cli_utilities_netstat_02_np6.question.fex Question 32. Correct A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown below. What should you do? (Choose two. Each response is a complete solution.) Remove the patch cable connecting the first switch to the third switch. Consolidate all patch cables from the patch panel to a single switch. Enable port security on each switch port.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Replace the patch cables connecting the switches together with red crossover cables. Enable STP on each switch. Connect the patch panel to the switches with red crossover cables. Explanation The assistant administrator in the scenario appears to have connected the switches together in a way that creates a bridge loop (sometimes called a switching loop). Notice the following: Switch1 is connected to Switch2 and Switch3. Switch2 is connected to Switch1 and Switch3. Switch3 is connected to Switch1 and Switch2. A bridge loop occurs when there are multiple Layer 2 paths between two network hosts. This usually results in a broadcast storm, as the switches repeatedly rebroadcast all broadcast messages, flooding the network. To fix this issue, you can do one of the following: Remove the patch cable connecting the first switch to the third switch. This will break the switching loop and stop the broadcast storm. Enable STP on each switch. STP ensures there is only one active path between switches. Switch ports that are part of that path are placed in a forwarding state. Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. When an active path goes down, the STP automatically recovers and activates the backup ports necessary to provide continued connectivity. Consolidating all patch cables from the patch panel to a single switch will not break the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
bridge loop, nor will enabling port security on each switch port. It is not necessary to replace the patch cables connecting the switches together with crossover cables, as most switches have auto-MDIX enabled by default. References 7.7.1 Switching and Routing Troubleshooting (Part 1) 7.7.4 Switching and Routing Troubleshooting Facts 14.2.4 Common Network Issues Facts q_network_issues_loop_np6.question.fex Question 33. Correct You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy? Document the solution. Test the solution. Recognize the potential side effects of the solution. Establish what has changed. Explanation After you implement a solution, you should always test it. Sometimes, more than one problem exists, or your solution may not have solved the issue. In this example, you may have incorrectly set the wires in the network cable you just fixed, or the user may have jarred the computer and damaged the NIC when she stepped on the cable. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
14.2.2 Troubleshooting Methodology Facts q_trouble_meth_test_np6.question.fex Question 34. Correct You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual networks Virtual desktops Virtual servers Network as a Service (NaaS) Explanation Server virtualization runs multiple instances of a server operating system on a single physical computer. With server virtualization, you can migrate servers on older hardware to newer computers or add virtual servers to computers with extra, unused hardware resources. Virtual desktops do not provide DHCP services. Virtual networks allow virtual servers and desktops to communicate with each other, and they can also allow communication with network devices out on the physical network via the host operating system. Network as a Service (NaaS) servers and desktops are virtualized and managed by a contracted third party. References 8.3.1 Virtualization Overview 8.3.2 Create a Virtual Machine
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.4.1 Virtual Networking Implementations 8.4.2 Virtual Network Devices 8.4.3 Configure Virtual Network Devices 8.4.4 Virtual Networking Facts 8.4.5 Virtualization Implementation Facts q_virt_implementation_server_np6.question.fex Question 35. Correct A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement? QoS Traffic shaping Spanning Tree Ethernet bonding Explanation Ethernet bonding (also called NIC teaming) logically groups two or more physical connections to the same network. If one NIC fails, the second one with a connection to the same network can still be used. Spanning Tree is a protocol on a switch that allows it to maintain multiple paths between other switches within a subnet. A traffic shaper (also called a bandwidth shaper) is a device that's capable of modifying the flow of data through a network. This happens in response to network traffic conditions. Quality of Service (QoS) refers to a set of mechanisms that try to guarantee timely delivery or minimal delay of important or time-sensitive communications. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help