Quiz 6 NP6
pdf
keyboard_arrow_up
School
Butler Community College *
*We aren’t endorsed by this school
Course
212
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
39
Uploaded by ChefFogDinosaur5
IT 212 Module 6 Quiz - NP6.0
Candidate: Marques Townsend (mtownz11)
Date: 2/15/2024, 4:46:42 AM • Time Spent: 14:07
Score: 100%
Passing Score: 65%
Question 1.
Correct
Which TCP/IP utility gives the following output?
arp -a
ipconfig
ifconfig
ping
Explanation
The ping command displays the results of four echo request/reply contacts with a
destination host.
Use the ifconfig command to show you the TCP/IP configuration for a Linux computer.
ipconfig is a utility used to obtain TCP/IP configuration on Windows systems.
Use the arp command to view the MAC addresses associated with IP addresses that the
local workstation has contacted recently. The -a switch shows current ARP cache tables.
References
4.9.1 IP Configuration Troubleshooting
4.9.4 IP Configuration Troubleshooting Facts
4.10.1 Network Communication Troubleshooting
4.10.2 Use ping and tracert
4.10.3 Network Communication Troubleshooting Facts
4.11.1 DNS Troubleshooting
4.11.2 DNS Troubleshooting Facts
14.3.1 Command Line Troubleshooting Utilities
14.3.2 Command Line Troubleshooting Utility Facts
q_cli_utilities_ping_02_np6.question.fex
Question 2.
Correct
Which of the following are benefits that a VPN provides? (Select two.)
Cost savings
Easy setup
Faster connection
Compatibility
Metering
Explanation
Benefits provided by VPNs include the following:
Benefits provided by VPNs include the following:
Cost savings - VPNs reduce connectivity costs while increasing remote connection
bandwidth.
Security - by using appropriate encryption and authentication protocols, data being
transmitted across the VPN can be secured from prying eyes.
Scalability - because VPNs use the internet, you can add additional users without
adding significant infrastructure.
Compatibility - you can implement VPNs across many different WAN types, including
broadband technologies.
A faster connection is not a benefit provided by a VPN. VPN connections are usually a bit
slower.
While setting up a VPN isn't necessarily difficult, it does require a few extra steps and setup.
Easy setup and configuration is not considered a benefit of a VPN.
Service metering is an advantage of cloud computing.
References
8.5.4 Virtual Private Networks
8.5.5 Virtual Private Networks Facts
8.5.6 IPsec Virtual Private Networks Facts
q_cloud_vpn_benefits_np6.question.fex
Question 3.
Correct
Your organization uses a time-keeping application that only runs on Windows 2000 and
does not run on newer OS versions. Because of this, there are several Windows 2000
workstations on your network.
Last week, you noticed unusual activity on your network coming from the workstations.
After further examination, you discover that they were victims of a malicious attack and
were being used to infiltrate the network.
You find out that the attackers were able to gain access to the workstations because of the
legacy operating system being used. Your organization still needs to use the Windows 2000
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
workstations (which need to be connected to the internet) but you want to make sure that
the network is protected from future attacks.
Which solution should you implement to protect the network while also allowing
operations to continue as normal?
Create a dedicated network for the Windows
2000 workstations that's completely isolated
from the rest of the network, including a
separate internet connection.
Install antivirus software on the Windows 2000
workstations, and configure them to
automatically download and install updates.
Implement a host-based firewall on each
Windows 2000 workstation, and configure
them to automatically download and install
updates.
Configure VLAN membership so that the
Windows 2000 workstations are on their own
VLAN.
Explanation
The best solution is to place the Windows 2000 workstations in their own VLAN. If you use
VLAN network segmentation, the workstations will still have access to the internet, but
network access can be heavily restricted. This greatly reduces the damage a workstation
can cause if it were to become compromised again.
Legacy operating systems, such as Windows 2000, are easy targets for attackers. This is
because these operating systems use outdated protocols and have known exploits.
Installing antivirus software or a host-based firewall would do very little to protect the
entire network. In addition, legacy operating system are no longer supported with updates
or patches, so enabling automatic updates would offer no benefit.
Creating a dedicated network for the workstations would affect normal operations and also
increase the network management load.
increase the network management load.
References
14.1.1 Optimization
14.1.3 Optimization Facts
14.2.3 Common Network Issues
14.2.4 Common Network Issues Facts
q_optimization_vlan_np6.question.fex
Question 4.
Correct
You are an application developer. You use a hypervisor with multiple virtual machines
installed to test your applications on various operating system versions and editions.
Currently, all of your test virtual machines are connected to the production network
through the hypervisor's network interface. You are concerned that the latest application
you are working on could adversely impact other network hosts if errors exist in the code.
To prevent problems, you decide to isolate the virtual machines from the production
network. However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Each response is one part of the complete solution.)
Connect the virtual network interfaces in the
virtual machines to the virtual switch.
Disconnect the network cable from the
hypervisor's network interface.
Create a new virtual switch configured for
host-only (internal) networking.
Create a new virtual switch configured for
bridged (external) networking.
Disable the switch port that the hypervisor's
network interface is connected to.
Create MAC address filters on the network
switch that block each virtual machine's virtual
network interfaces.
Explanation
To allow the virtual machines to communicate with each other while isolating them from
the production network, complete the following:
Create a new virtual switch configured for host-only (internal) networking.
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Creating a bridged virtual switch would still allow the virtual machines to communicate on
the production network through the hypervisor's network interface.
Disconnecting the hypervisor's network cable, blocking the virtual machine's MAC
addresses, or disabling the hypervisor's switch port would isolate the virtual machines
from the production network, but this would also prevent them from communicating with
each other.
References
8.3.1 Virtualization Overview
8.3.2 Create a Virtual Machine
8.3.3 Virtualization Facts
8.4.1 Virtual Networking Implementations
8.4.2 Virtual Network Devices
8.4.3 Configure Virtual Network Devices
8.4.4 Virtual Networking Facts
8.4.5 Virtualization Implementation Facts
q_virt_networking_switch_03_np6.question.fex
Question 5.
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You want to be able to monitor and filter VM-to-VM traffic within a virtual network.
What should you do?
Define VLAN memberships on each VM.
Create a virtual router with VRF technology.
Implement a virtual firewall within the
hypervisor.
Route VM-to-VM traffic through a physical
firewall and back to the virtual network.
Explanation
Virtualized hosts are susceptible to the same network exploits as physical network hosts
and need to be protected by a firewall. By implementing a virtual firewall within the
hypervisor itself, you can monitor and filter traffic on the virtual network as it flows
between virtual machines.
While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient.
A virtual router with VRF (Virtual Route Forwarding) is used to create multiple networks
from a single router interface.
Configuring VLAN membership would not allow you to monitor and filter traffic.
References
8.4.4 Virtual Networking Facts
q_virt_networking_firewall_np6.question.fex
Question 6.
Correct
Which of the following are IPsec modes of operation? (Select two.)
Multimode
Single mode
Tunnel mode
Transport mode
Secure mode
Explanation
Tunnel mode and transport mode are the two IPsec modes of operation.
Single mode and multimode are types of fiber optic network cable.
Secure mode is a wireless LAN setting.
References
8.5.4 Virtual Private Networks
8.5.5 Virtual Private Networks Facts
8.5.6 IPsec Virtual Private Networks Facts
q_ipsec_vpn_mode_np6.question.fex
Question 7.
Correct
Which of the following are true regarding cloud computing? (Select three.)
Cloud computing consists of software, data
access, computation, and storage services
provided to clients through the internet.
Typical cloud computing providers deliver
common business applications online. They
are accessed from another web service or
software, like a web browser.
The term cloud is used as a synonym for the
internet.
Cloud computing requires end user knowledge
of the delivery system's physical location and
configuration.
configuration.
Explanation
Cloud computing does not require end user knowledge of the delivery system's physical
location and configuration. Other cloud computing details include the following:
Cloud computing consists of software, data access, computation, and storage services
provided to clients through the internet.
The term cloud is used as a synonym for the internet. This is based on the basic cloud
drawing used to represent the telephone network infrastructure and the internet in
computer network diagrams.
Typical cloud computing providers deliver common business applications online that
are accessed from another web service or software, like a web browser. The software
and data are stored on servers.
References
8.5.3 Cloud Facts
q_cloud_computing_mp6.question.fex
Question 8.
Correct
Which of the following provides a VPN gateway that encapsulates and encrypts outbound
traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the
target site?
Site-to-site IPsec VPN
Remote access VPN
SSL VPN
GRE over IPsec
Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Site-to-site IPsec VPNs connect networks across an untrusted network, such as the
internet. The VPN gateway encapsulates and encrypts outbound traffic from a site and
sends the traffic through a VPN tunnel to the VPN gateway at the target site. Clients send
and receive normal unencrypted TCP/IP traffic through a VPN gateway. The receiving VPN
gateway strips the headers, decrypts the content, and relays the packet toward the target
host inside its private network.
SSL VPNs use a PKI (public key infrastructure) and digital certificates to authenticate peers.
GRE over IPsec (Generic Routing Encapsulation over IPsec) does not support encryption.
Remote access VPNs let remote and mobile users connect to an organizational network
securely.
References
8.5.4 Virtual Private Networks
8.5.5 Virtual Private Networks Facts
8.5.6 IPsec Virtual Private Networks Facts
q_cloud_vpn_ipsec_np6.question.fex
Question 9.
Correct
Which of the following statements are true about virtual NICs? (Select two.)
Virtual NICs need the appropriate driver to
function.
The type of NIC installed in the physical
machine determines the type of virtual NIC
that is emulated.
Virtual NICs can only communicate with other
virtual NICs.
virtual NICs.
Virtual NICs don't have a MAC address.
Multiple virtual NICs can be added to a virtual
machine.
Explanation
Within each virtual machine, you can configure one or more virtual network interfaces,
which function similarly to physical network interfaces. Virtual interfaces use Ethernet
standards to transmit and receive frames on a network. The operating system within the
virtual machine must have the appropriate driver installed to support the virtual network
interface, just as with a physical network interface.
When you configure a virtual network interface within a virtual machine's configuration,
you can specify:
The type of physical network interface to emulate. This allows the best possible driver
support from the operating system within the virtual machine.
A MAC address. Most hypervisors automatically assign a MAC address to each virtual
network interface. Some hypervisors allow you to use a custom MAC address if
needed.
The network to connect to. Most hypervisors allow you to define many different
virtual networks.
When you configure a virtual network interface, you select which virtual network you
want it to connect to.
References
8.3.1 Virtualization Overview
8.3.2 Create a Virtual Machine
8.4.1 Virtual Networking Implementations
8.4.2 Virtual Network Devices
8.4.3 Configure Virtual Network Devices
8.4.4 Virtual Networking Facts
8.4.5 Virtualization Implementation Facts
q_virt_networking_nic_np6.question.fex
Question 10.
Correct
What is a VPN (virtual private network) primarily used for?
Support the distribution of public web
documents.
Support secure communications over an
untrusted network.
Allow remote systems to save on long distance
charges.
Allow the use of network-attached printers.
Explanation
A VPN (virtual private network) is primarily used to support secure communications over an
untrusted network. You can use a VPN over a local area network, across a WAN connection,
over the internet, and even between a client and a server over a dial-up internet
connection.
All of the other items listed in this question are benefits or capabilities that are secondary
to this primary purpose.
References
8.5.4 Virtual Private Networks
8.5.5 Virtual Private Networks Facts
8.5.6 IPsec Virtual Private Networks Facts
q_cloud_vpn_secure_np6.question.fex
Question 11.
Correct
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts
the router back online.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
After doing some research, you find that the MOST likely cause is a bug in the router
software. A new patch is available from the manufacturer that is supposed to eliminate the
problem.
What should you do next?
Identify the affected areas.
Apply the patch to the router.
Identify possible side effects of the solution.
Document the problem and the solution.
Explanation
Based on the troubleshooting process, you should create an action plan and identify
possible side effects of implementing the solution. For example, you might consider how
long the router will be offline to apply the patch, how long it will take to implement the
solution, and which problems might occur during the process.
Take the action to fix the problem only after you have created the plan, identified the side
effects, and determined the best time to implement the fix. Document the solution after
the problem is fixed and verified. Identifying the affected areas is part of the process you
take before arriving at a probable solution.
References
14.2.1 Troubleshooting Methodology
14.2.2 Troubleshooting Methodology Facts
q_trouble_meth_solution_np6.question.fex
Question 12.
Correct
You are adding a new rack to your data center, which will house two new blade servers and
a new switch. The new servers will be used for file storage and a database server.
The only space you have available in the data center is on the opposite side of the room
from your existing rack, which already houses several servers, a switch, and a router. You
plan to configure a trunk port on each switch and connect them with a crossover UTP
plenum cable that will run through the suspended tile ceiling in the data center.
To provide power for the new devices, you had an electrician install several new 20-amp
wall outlets near the new rack. Each device on the rack will be plugged directly into one of
these new wall outlets.
What is wrong with this configuration? (Select two.)
You should not run a plenum cable through a
suspended tile ceiling.
You must use a straight-through cable to
connect the two switches together.
You should implement redundant power
supplies for the network devices.
You should implement a UPS between the wall
outlet and the network devices.
You should not connect networking equipment
to a 20-amp wall circuit.
Explanation
In this scenario, all the devices on the new rack will go down if the power from the wall
outlet fails for some reason (such as a power outage). To prevent this from happening, you
should implement a UPS between the wall outlets and the network devices. In addition, the
power supplies used by computing equipment have finite life spans and fail frequently.
Because these are mission-critical devices, you should consider implementing redundant
power supplies.
Plenum network cabling is specifically designed to run through a suspended tile ceiling.
The space between the suspended tile and the physical ceiling is called a ceiling plenum.
In the early days of networking, crossover cables were required to uplink two hubs or
switches together. However, most modern switches implement auto-MDIX, which detects
whether crossover is required and automatically configures the interface, allowing you to
use either a crossover or straight-through cable. Using a 20-amp circuit for networking
equipment is considered a data center best practice. Connecting too many devices to a
standard 15-amp wall circuit can overload it and trip its breaker.
References
11.6.4 Power Management
11.6.5 Power Management Facts
11.6.6 Configure UPS Settings
q_pwr_prot_ups_02_np6.question.fex
Question 13.
Correct
Users report that the network is down. As a help desk technician, you investigate and
determine that a specific router is configured so that a routing loop exists.
What should you do next?
Fix the problem.
Create an action plan.
Determine if escalation is needed.
Document the problem.
Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
After identifying the most probable cause, escalate the problem if it is beyond your ability
to fix or if it is out of your scope of management. For example, the problem might be on a
router configuration that you are not authorized to correct. When forwarding the problem
on to someone else, be sure to describe the nature of the problem, the actions you have
already taken, and the symptoms that lead you to believe the problem is outside of your
area of responsibility.
If you decide that escalation is not necessary, you can then create an action plan that
includes the fix and identify possible side effects of implementing it. After the solution has
been implemented, verify that it works and that there were no unforeseen consequences.
Finally, document the problem and the solution.
References
14.2.1 Troubleshooting Methodology
14.2.2 Troubleshooting Methodology Facts
q_trouble_meth_escalation_np6.question.fex
Question 14.
Correct
Which TCP/IP utility gives you the following output?
ipconfig
netstat -a
arp -a
ping
Explanation
The ipconfig command shows a computer's TCP/IP configuration information.
netstat -a shows you the status of all connections and listening ports.
The ping command shows you the results of four echo request/reply contacts with a
destination host.
The arp -a switch shows you current ARP cache tables.
References
4.9.1 IP Configuration Troubleshooting
4.9.2 Use ipconfig
4.9.3 Use the ip Command
4.9.4 IP Configuration Troubleshooting Facts
4.10.1 Network Communication Troubleshooting
4.11.2 DNS Troubleshooting Facts
14.3.1 Command Line Troubleshooting Utilities
14.3.2 Command Line Troubleshooting Utility Facts
q_cli_utilities_ipconfig_02_np6.question.fex
q_cli_utilities_ipconfig_02_np6.question.fex
Question 15.
Correct
You want to make sure that a set of servers will only accept traffic for specific network
services. You have verified that the servers are only running the necessary services, but you
also want to make sure that the servers will not accept packets sent to those services.
Which tool should you use?
IPS
Packet sniffer
Port scanner
IDS
System logs
Explanation
Use a port scanner to check for open ports on a system or firewall. Compare the list of
opened ports with the list of ports allowed by your network design and security policy.
Typically, a port is opened when a service starts or is configured on a device. Open ports for
unused services expose the server to attacks directed towards that port.
Use a packet sniffer to examine packets on your network. With a packet sniffer, you can
identify packets directed towards specific ports, but you won't be able to tell if those ports
are open. Examine system logs to look for events that have happened on a system, which
might include a service starting, but would not likely reflect open ports.
An intrusion detection system (IDS) is a special network device that can detect attacks and
suspicious activity. A passive IDS monitors, logs, and detects security breaches, but takes
no action to stop or prevent the attack. An active IDS (also called an intrusion protection
system, or IPS) performs the functions of an IDS, but it can also react when security
breaches occur.
References
11.4.2 Protocol Analyzers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11.4.2 Protocol Analyzers
14.3.5 Software Troubleshooting Utilities
14.3.6 Software Troubleshooting Utilities Facts
14.3.7 Troubleshoot with Wireshark
q_software_utilities_port_scanner_np6.question.fex
Question 16.
Correct
You manage your company's website, which uses a cluster of two servers with a single
shared storage device. The shared storage device uses a RAID 1 configuration. Each server
has a single connection to the shared storage and a single connection to your ISP.
You want to provide redundancy so that a failure on a single component doesn't cause the
website to become unavailable. What should you add to your configuration to accomplish
this?
On each server, add a second network
connection to the internet.
Reconfigure the disk array in a RAID 1+0
configuration.
On each server, add a second network
connection to connect the server to the shared
storage device.
Connect one server to the internet through a
different ISP.
Explanation
In this scenario, the ISP is the single point of failure. If the ISP connection goes down, the
website will be unavailable. Connecting one server to a different ISP or both servers to two
ISPs provides redundancy for the connection.
Adding multiple network connections to the shared storage or the same ISP is unnecessary
because if the single network connection on one server fails, the other server will still be
available. Reconfiguring the storage as a RAID 1+0 allows multiple disk failures, but RAID 1
can sustain a failure on a single disk.
can sustain a failure on a single disk.
References
11.6.3 Redundancy and High Availability Facts
q_redundancy_avail_ips_np6.question.fex
Question 17.
Correct
IPsec is implemented through two separate protocols. What are these protocols called?
(Select two.)
L2TP
AH
EPS
ESP
SSL
Explanation
IPsec is implemented through two separate protocols, which are called Authentication
Header (AH) and Encapsulating Security Payload (ESP). AH provides authentication and
non-repudiation services to verify that the sender is genuine and that the data was not
modified in transit. ESP provides data encryption services for the data within the packet.
SSL and L2TP are not protocols associated with IPsec.
References
8.5.4 Virtual Private Networks
8.5.5 Virtual Private Networks Facts
8.5.6 IPsec Virtual Private Networks Facts
q_ipsec_vpn_ah_esp_np6.question.fex
Question 18.
Correct
With Wireshark, you've used a filter to capture only the desired packet types. Using the
information shown in the image, which of the following BEST describes the effects of using
the host 192.168.0.34 filter?
Only packets with 192.168.0.34 in the
destination address are captured.
Only packets on the 192.168.0.34 network are
captured.
Only packets with 192.168.0.34 in either the
source or destination address are captured.
Only packets with 192.168.0.34 in the source
address are captured.
Explanation
Wireshark's host filter lets you only capture where the specified IP address is in either the
source or the destination address.
The IP address of 192.168.0.34 is a specific address for an individual device. It is not an
address for the entire network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
address for the entire network.
References
11.4.2 Protocol Analyzers
14.3.5 Software Troubleshooting Utilities
14.3.6 Software Troubleshooting Utilities Facts
14.3.8 Use Wireshark to Troubleshoot Network Issues
14.3.10 Wireshark Facts
q_trouble_wireshark_filter_02_np6.question.fex
Question 19.
Correct
Which key advantage does a virtual router have over a physical router?
It has faster routing performance.
Multiple networks can connect to a single
interface.
Routing protocols are not necessary for
routing data between networks.
It allows Virtual Router Redundancy Protocol
(VRRP).
Explanation
The key advantage to a virtual router is that it can support multiple networks on a single
router interface. A virtual router does this by using a different routing table for each
network. Physical routers are limited to a single network on each interface.
Like physical routers, virtual routers use routing protocols to route data between networks.
VRRP is used by physical routers to specify backup routers in the case of failure.
Virtual routers do not offer significant performance increases.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
8.4.4 Virtual Networking Facts
q_virt_networking_router_np6.question.fex
Question 20.
Correct
Which type of switch optimizes network performance by using ASIC to perform switching
at wire speed?
Layer 1 switch
Layer 2 switch
Unmanaged switch
Multilayer switch
Explanation
A multilayer switch uses specialized hardware called an application-specific integrated
circuit (ASIC) to perform switching functions in hardware rather than using the CPU and
software. ASIC allows switches to perform the switching function at wire speed.
Layer 2 switches use the CPU and software to forward frames. Unmanaged switches are
also called Layer 2 switches.
A Layer 1 switch is another name for a hub, which does not perform any traffic inspection.
Rather, the switch sends out received packets on all ports.
References
14.1.3 Optimization Facts
q_optimization_multilayer_np6.question.fex
Question 21.
Correct
What is the purpose of using Ethernet bonding? (Select two.)
Increases read and write operations between
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Increases read and write operations between
the system bus and network adapters
Provides a failover solution for network
adapters
Provides increased bus speeds
Increases network performance
Enables dual remote access (DRA) over a WAN
link
Explanation
For a true fault-tolerant strategy, you must consider all system components. Ethernet
bonding (also called adapter teaming) is a fault-tolerant strategy that uses multiple
network adapters configured on a failover solution. In the event of a NIC failure, other
adapters automatically provide link redundancy. Multiple adapters can also increase
performance by distributing the network load between adapters.
Ethernet bonding does not provide increased bus speeds, increase read and write
operations between the system bus and network adapters, or enable dual remote access
(DRA) over a WAN link.
References
11.6.3 Redundancy and High Availability Facts
11.6.8 Set Up NIC Teaming
11.6.10 Configure Linux Network Bonding
11.6.11 NIC Teaming Facts
q_nic_teaming_bonding_01_np6.question.fex
Question 22.
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You are adding a new rack to your data center, which will house two new blade servers and
a new switch. The new servers will be used for virtualization.
The only space you have available in the data center is on the opposite side of the room
from your existing rack, which already houses several servers, a switch, and a router. You
plan to configure a trunk port on each switch and connect them with a straight-through
UTP cable that will run across the floor of the data center.
To protect equipment from power failures, you also plan to install a UPS on the rack along
with redundant power supplies for the server.
Will this configuration work?
No, you must implement the UPS and power
supplies on the rack externally.
No, you should not use blade servers for
virtualization.
No, you should not run a cable across the data
center floor.
Yes, this configuration complies with data
center best practices.
No, you must use a cross-over cable to connect
the two switches together.
Explanation
In this scenario, running a cable across the data center floor represents a tripping hazard.
It also represents a point of failure, as the cable will be walked on constantly, resulting in it
being kicked out of one or both jacks. It will also likely fail prematurely due to the excessive
wear. A better option would be to run the cable through the ceiling plenum.
Blade servers work well for virtualization as long as they meet the system requirements for
the hypervisor software. In the early days of networking, crossover cables were required to
uplink two hubs or switches together. However, most modern switches implement auto-
MDIX, which detects whether crossover is required and automatically configures the
interface for you, making a crossover cable unnecessary. Rack-mounted power supplies
and UPS devices are commonly used in data centers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
11.6.4 Power Management
11.6.5 Power Management Facts
11.6.6 Configure UPS Settings
q_pwr_prot_ups_01_np6.question.fex
Question 23.
Correct
Why should you store backup media off site?
To prevent the same disaster from affecting
both the network and the backup media
To reduce the possibility of theft
To make the restoration process more efficient
To comply with government regulations
Explanation
Backup media should be stored off site to prevent the same disaster from affecting the
network and the backup media. If your primary facility is destroyed, your only hope of
recovery is off site data storage.
Off site storage does not significantly reduce the possibility of media theft because it can
be stolen while in transit or at your storage location.
Off site storage is not a government regulation.
Off site storage does not make the restoration process more efficient because additional
time is spent retrieving backup media from the offsite storage location.
References
11.6.3 Redundancy and High Availability Facts
q_redundancy_avail_offsite_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 24.
Correct
While working on a Linux server, you're unable to connect to the Windows Server system
on the internet. You are able to ping the default gateway on your own network, so you
suspect that the problem lies outside the local network.
Which utility would you use to track the route a packet takes as it crosses the network?
nslookup
traceroute
ifconfig
tracert
Explanation
traceroute is a Linux utility that allows you to track a packet's route as it traverses the
network. The traceroute utility is used on Linux systems, while tracert is used on Windows
systems.
ifconfig is a utility used to obtain TCP/IP configuration on Linux systems.
nslookup is a utility used to perform manual DNS lookups on Windows systems.
References
4.10.2 Use ping and tracert
4.10.3 Network Communication Troubleshooting Facts
4.11.1 DNS Troubleshooting
4.11.2 DNS Troubleshooting Facts
14.3.1 Command Line Troubleshooting Utilities
14.3.2 Command Line Troubleshooting Utility Facts
q_cli_utilities_traceroute_np6.question.fex
Question 25.
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You were recently hired by a small startup company. The company is in a small office and
has several remote employees.
You have been asked to find a business service that can both accommodate the company's
current size and scale as the company grows. The service needs to provide adequate
storage as well as additional computing power.
Which cloud service model should you use?
PaaS
IaaS
IaC
SaaS
Explanation
Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing,
storage, networks, and virtualized environments. The client deploys and runs software
without purchasing servers, data center space, or network equipment.
Software as a Service (SaaS) delivers software applications to the client either over the
internet or on a local area network.
Platform as a Service (PaaS) delivers everything a developer needs to build an application
on to the cloud infrastructure. The deployment comes without the cost and complexity of
buying and managing the underlying hardware and software layers.
Infrastructure as Code (IaC) provides IT infrastructure management using config files.
However, it does not provide the features or support required by the company in this
scenario.
References
8.5.3 Cloud Facts
q_cloud_iaas_mp6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 26.
Correct
In addition to performing regular backups, what must you do to protect your system from
data loss?
Restrict restoration privileges to system
administrators.
Regularly test restoration procedures.
Write-protect all backup media.
Store the backup media in an on-site fireproof
vault.
Explanation
The only way to ensure that you have protection against data loss is to regularly test your
restoration procedures. This activity reveals whether or not your backup process functions
properly and your restoration and recovery procedures are accurate.
It's a good idea to store backup media in a fireproof vault, but it's a better idea to store it
off site.
You should restrict restoration privileges to trusted staff to prevent confidentiality
violations. However, this does not address the issue of data loss protection.
Write-protecting backup media provides little real security for the stored data because
anyone can flip the switch on the media to remove the protection.
References
11.6.3 Redundancy and High Availability Facts
q_redundancy_avail_restore_np6.question.fex
Question 27.
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Which of the following is the least effective power loss protection for computer systems?
Uninterruptible power supply
Backup power generator
Surge protector
Secondary power source
Explanation
A surge protector provides no power loss protection.
A UPS, a secondary power source, and a backup power generator all provide reasonable
protection from power loss.
References
11.6.5 Power Management Facts
q_pwr_prot_surge_np6.question.fex
Question 28.
Correct
Which of the following components do switches use to optimize network performance by
performing switching operations in hardware rather than using the CPU and software?
An application-specific integrated circuit
Ethernet bonding
A caching engine
A traffic shaper
Explanation
Switches use specialized hardware called an application-specific integrated circuit (ASIC),
which performs switching functions in hardware rather than using the CPU and software.
ASIC allows switches to perform the switching function at wire speed.
Caching engines store frequently accessed content for faster access. Content is retrieved
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Caching engines store frequently accessed content for faster access. Content is retrieved
from the local network instead of the internet.
Ethernet bonding creates two or more physical connections to the same network by
bonding NICs or switch ports together. Ethernet bonding provides increased performance
and some fault tolerance.
A traffic shaper (also called a bandwidth shaper) is a device that's capable of modifying the
flow of data through a network. This happens in response to network traffic conditions.
References
14.1.1 Optimization
14.1.3 Optimization Facts
14.2.3 Common Network Issues
14.2.4 Common Network Issues Facts
q_optimization_circuit_np6.question.fex
Question 29.
Correct
Which of the following devices accepts incoming client requests and distributes those
requests to specific servers?
CSU/DSU
Load balancer
Media converter
Caching engine
Explanation
A load balancer is a device that accepts incoming client requests and distributes those
requests to multiple servers. One goal of load balancing is to distribute client requests
evenly between multiple servers to improve performance.
A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the signal
received from the WAN provider into a signal that can be used by equipment at the
customer site. An intrusion prevention system (IPS) can detect and respond to security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
customer site. An intrusion prevention system (IPS) can detect and respond to security
events.
A caching engine saves copies of frequently used content, eliminating the need to
download the content each time it's requested.
A media converter converts signals used on one media type (such as twisted-pair Ethernet)
to another media type (such as fiber optic).
References
11.6.3 Redundancy and High Availability Facts
11.6.11 NIC Teaming Facts
11.6.12 Configure a Load Balancing Server
q_nic_teaming_balancer_np6.question.fex
Question 30.
Correct
You are in the process of implementing a network access protection (NAP) infrastructure to
increase your network's security.
You are currently configuring the remediation network that non-compliant clients will
connect to in order to become compliant. You need to isolate the remediation network
from the secure network.
Which technology should you implement to accomplish this task?
Data encryption using PKI
Virtual private network (VPN)
Port security
Network segmentation
Explanation
Implementing network segmentation would isolate the remediation server from the rest of
the network while still allowing the remediation server to contact the NAP infrastructure.
A virtual private network (VPN) creates a secure connection between two hosts or two sites
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A virtual private network (VPN) creates a secure connection between two hosts or two sites
over an unsecured network.
Encrypting data transmissions using PKI would only protect transmitted data, not isolate
the remediation network.
Port security identifies allowed and denied devices that connect to a switch port. Doing this
would not isolate the remediation network.
References
14.1.1 Optimization
14.1.3 Optimization Facts
14.2.3 Common Network Issues
14.2.4 Common Network Issues Facts
q_optimization_segmentation_np6.question.fex
Question 31.
Correct
Examine the following output:
Active Connections
Proto Local Address Foreign Address State
TCP SERVER1:1036 localhost:4832 TIME_WAIT
TCP SERVER1:4798 localhost:1032 TIME_WAIT
TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT
TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED
TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED
TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED
Which of the following utilities produced this output?
netstat
ifconfig
dig
nslookup
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
nslookup
Explanation
The netstat command produced the output. netstat reports the TCP/IP ports that are open
on the local system, as well as identifying the protocol and remote host connected to that
port. This information can be very useful when looking for security weaknesses, as a TCP/IP
port that's open to traffic unnecessarily represents a security risk.
ifconfig is a tool used on Unix, Linux, and Macintosh systems to view the configuration of
network interfaces, including TCP/IP network settings.
The dig command allows you to perform manual DNS lookups from a Linux or Unix system.
This can be very useful when troubleshooting name resolution issues.
nslookup allows you to perform manual DNS lookups from a Windows system.
References
4.10.4 Use arp and netstat
4.10.5 arp and netstat Facts
14.3.1 Command Line Troubleshooting Utilities
14.3.2 Command Line Troubleshooting Utility Facts
q_cli_utilities_netstat_02_np6.question.fex
Question 32.
Correct
A new assistant network administrator was recently hired by your organization to relieve
some of your workload.
You assigned the assistant network administrator to replace a defective patch cable that
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
connected port 1 on your patch panel to one of your network switches. You noticed that it
took him an unusually long time to complete this task. Once done, users almost
immediately began to report that the network had gone down.
Upon entering the server room, you see that the assistant administrator has configured
your network rack as shown below.
What should you do? (Choose two. Each response is a complete solution.)
Remove the patch cable connecting the first
switch to the third switch.
Consolidate all patch cables from the patch
panel to a single switch.
Enable port security on each switch port.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Replace the patch cables connecting the
switches together with red crossover cables.
Enable STP on each switch.
Connect the patch panel to the switches with
red crossover cables.
Explanation
The assistant administrator in the scenario appears to have connected the switches
together in a way that creates a bridge loop (sometimes called a switching loop). Notice the
following:
Switch1 is connected to Switch2 and Switch3.
Switch2 is connected to Switch1 and Switch3.
Switch3 is connected to Switch1 and Switch2.
A bridge loop occurs when there are multiple Layer 2 paths between two network hosts.
This usually results in a broadcast storm, as the switches repeatedly rebroadcast all
broadcast messages, flooding the network.
To fix this issue, you can do one of the following:
Remove the patch cable connecting the first switch to the third switch. This will break
the switching loop and stop the broadcast storm.
Enable STP on each switch. STP ensures there is only one active path between
switches. Switch ports that are part of that path are placed in a forwarding state.
Switch ports that are part of redundant but unused paths are placed in a blocking
(non-forwarding) state. When an active path goes down, the STP automatically
recovers and activates the backup ports necessary to provide continued connectivity.
Consolidating all patch cables from the patch panel to a single switch will not break the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
bridge loop, nor will enabling port security on each switch port. It is not necessary to
replace the patch cables connecting the switches together with crossover cables, as most
switches have auto-MDIX enabled by default.
References
7.7.1 Switching and Routing Troubleshooting (Part 1)
7.7.4 Switching and Routing Troubleshooting Facts
14.2.4 Common Network Issues Facts
q_network_issues_loop_np6.question.fex
Question 33.
Correct
You are a network administrator for your company. A user calls and tells you that after
stepping on the network cable in her office, she can no longer access the network.
You go to the office and see that some of the wires in the Cat 5 network cable are now
exposed. You make another cable and attach it from the wall plate to the user's computer.
What should you do next in your troubleshooting strategy?
Document the solution.
Test the solution.
Recognize the potential side effects of the
solution.
Establish what has changed.
Explanation
After you implement a solution, you should always test it. Sometimes, more than one
problem exists, or your solution may not have solved the issue. In this example, you may
have incorrectly set the wires in the network cable you just fixed, or the user may have
jarred the computer and damaged the NIC when she stepped on the cable.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
14.2.2 Troubleshooting Methodology Facts
q_trouble_meth_test_np6.question.fex
Question 34.
Correct
You need to provide DHCP and file sharing services to a physical network. These services
should be deployed using virtualization. Which type of virtualization should you
implement?
Virtual networks
Virtual desktops
Virtual servers
Network as a Service (NaaS)
Explanation
Server virtualization runs multiple instances of a server operating system on a single
physical computer. With server virtualization, you can migrate servers on older hardware to
newer computers or add virtual servers to computers with extra, unused hardware
resources.
Virtual desktops do not provide DHCP services.
Virtual networks allow virtual servers and desktops to communicate with each other, and
they can also allow communication with network devices out on the physical network via
the host operating system.
Network as a Service (NaaS) servers and desktops are virtualized and managed by a
contracted third party.
References
8.3.1 Virtualization Overview
8.3.2 Create a Virtual Machine
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.4.1 Virtual Networking Implementations
8.4.2 Virtual Network Devices
8.4.3 Configure Virtual Network Devices
8.4.4 Virtual Networking Facts
8.4.5 Virtualization Implementation Facts
q_virt_implementation_server_np6.question.fex
Question 35.
Correct
A web server on your network hosts your company's public website. You want to make sure
that an NIC failure doesn't prevent the website from being accessible on the internet.
Which solution should you implement?
QoS
Traffic shaping
Spanning Tree
Ethernet bonding
Explanation
Ethernet bonding (also called NIC teaming) logically groups two or more physical
connections to the same network. If one NIC fails, the second one with a connection to the
same network can still be used.
Spanning Tree is a protocol on a switch that allows it to maintain multiple paths between
other switches within a subnet.
A traffic shaper (also called a bandwidth shaper) is a device that's capable of modifying the
flow of data through a network. This happens in response to network traffic conditions.
Quality of Service (QoS) refers to a set of mechanisms that try to guarantee timely delivery
or minimal delay of important or time-sensitive communications.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help