Testout Network Pro Modules 8-14: Mega Study Guide

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/352

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:14 PM on 6/1/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

353 Terms

1
New cards
Which of the following BEST defines a SAN?
A block-level storage network
2
New cards
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server.
Which network-based storage technology is being used?
NAS with clustering
3
New cards
Which of the following are the components of a SAN?
Hosts, storage, and SAN fabric
4
New cards
Brett has been tasked with creating a new SAN. The company currently has Gigabit internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN. Brett tells the CTO that this will not work. Which of the following BEST describes the problem?
Fibre Channel over Ethernet requires 10 Gigabit internet.
5
New cards
What BEST describes the designed purpose of InfiniBand?
High-performance supercomputers
6
New cards
You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
iSCSI Initiator
7
New cards
Within an SDN, what is commonly referred to as the brains?
Controllers
8
New cards
Which option BEST describes the third layer in the SDN architecture?
Infrastructure
9
New cards
What are the three layers of an SDN?
Application, Control, and Infrastructure
10
New cards
Which of the following BEST describes the main purpose of the codec used in VoIP?
An algorithm to compress data in order to save on bandwidth.
11
New cards
Which of the following BEST describes VoIP (Voice over Internet Protocol)?
A protocol optimized for voice data transmission (telephone calls) through a packet-switched IP network.
12
New cards
Which of the following are considered VoIP endpoints?
Hard phones and soft phones
13
New cards
Larry is tasked with implementing a VoIP system in the office. He presents his research to his boss, who wants to use the current hard phones to save money. What BEST explains why this is not possible?
A hard phone does not have the internal computing parts to accept VoIP transmissions.
14
New cards
Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference?
Jitter is the up and down variation in latency.
15
New cards
Dan, a network administrator, gets an email from the CEO. She is upset because people keep talking over each other on conference calls. Which option BEST describes Dan's first step to remedy this problem?
Check the latency configuration. Latency should be set between 75 and 150 milliseconds.
16
New cards
Dan, a network administrator, has noticed a consistent increase in bandwidth consumption since installing a new VoIP system. The increase is outside of the parameters given by the vendor. What is MOST likely the issue Dan needs to address?
The codec needs to be replaced with a more efficient one.
17
New cards
VoIP uses several protocols. Which layer of the OSI model do these protocols reside on?
Transport
18
New cards
What is the MOST common Transport layer protocol that VoIP uses?
UDP
19
New cards
Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform.
Which of the following systems should you recommend?
Unified communications
20
New cards
Which hardware components are controlled by the hypervisor?
RAM, CPU, storage
21
New cards
John is using a host machine with a Type1 hypervisor. He has 40 virtual servers using unmodified guest OSs. Which type of virtualization BEST describes this configuration?
Full virtualization
22
New cards
How many types of full virtualization are there?
Two
23
New cards
In virtualization, what is the role of a hypervisor?
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
24
New cards
Which of the following BEST describes an enterprise-level hypervisor?
Type 1
25
New cards
Amber's employer has asked her to research what is needed to best utilize current assets in creating a scalable network. Amber knows that the company has two very robust servers. What is her BEST solution?
Convert the existing servers into host servers for virtualization using a Type 1 hypervisor.
26
New cards
Which hypervisor is for bare metal use?
Type 1
27
New cards
Which form of virtualization does not virtualize the hardware?
Paravirtualization
28
New cards
Which resource is nearly impossible to decrease once allocated in virtualization?
Storage
29
New cards
You want to be able to monitor and filter VM-to-VM traffic within a virtual network.
What should you do?
Implement a virtual firewall within the hypervisor.
30
New cards
Which key advantage does a virtual router have over a physical router?
Multiple networks can connect to a single interface.
31
New cards
Which of the following statements are true about virtual NICs? (Select two.)
Virtual NICs need the appropriate driver to function.
Multiple virtual NICs can be added to a virtual machine.
32
New cards
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions.
Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.
To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Each response is one part of the complete solution.)
Create a new virtual switch configured for host-only (internal) networking.

Connect the virtual network interfaces in the virtual machines to the virtual switch.
33
New cards
Which component is MOST likely to allow physical and virtual machines to communicate with each other?
Virtual switch
34
New cards
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
Virtual servers
35
New cards
Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network.
Last week, you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discovered that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network.
You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events.
Which solution should you implement to protect the network while also allowing operations to continue as normal?
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.
36
New cards
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working.
To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations.
Currently, none of your test virtual machines has a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates.
What should you do? (Select two. Each response is one part of the complete solution.)
Create a new virtual switch configured for bridged (external) networking.

Connect the virtual network interfaces in the virtual machines to the virtual switch.
37
New cards
You were recently hired by a small startup company. The company is in a small office and has several remote employees.
You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power.
Which cloud service model should you use?
IaaS
38
New cards
Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?
SaaS
39
New cards
Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site?
Site-to-site IPsec VPN
40
New cards
What is a VPN (virtual private network) primarily used for?
Support secure communications over an untrusted network.
41
New cards
Which other service is IPsec composed of, in addition to AH?
Encapsulating Security Payload (ESP)
42
New cards
You notice that a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
Internet of Things (IoT)
43
New cards
Which of the following is considered part of a smart home?
Thermostat
44
New cards
Which frequencies does Zigbee operate on?
2.4 GHz, 900 MHz, and 868 MHz
45
New cards
Anabel purchased a smart speaker. She connected it to all the smart devices in her home. Which of the following communication models is she using?
Device-to-device
46
New cards
Which of the following are benefits that a VPN provides? (Select two.)
Compatibility, Cost savings
47
New cards
What is the maximum number of nodes Z-Wave allows on its mesh network?
232
48
New cards
What are the four primary systems of IoT technology?
Devices, gateway, data storage, and remote control
49
New cards
Which of the following are examples of newer devices that are often automated using IoT technology? (Select three.)
Home appliances, Security systems, Streaming media devices
50
New cards
IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)
ESP, AH
51
New cards
What are the two protocols used most often with IoT devices? (Select two.)
Z-Wave, Zigbee
52
New cards
Which type of communication path-sharing technology do all 802.11 standards for wireless networking support?
CSMA/CA
53
New cards
Which of the following is true of a wireless network SSID?
Groups wireless devices together into the same logical network.
54
New cards
Which wireless networking component is used to connect multiple APs together?
WDS
55
New cards
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building:
A wireless television distribution system running at 2.4 GHz.
A wireless phone system running at 5.8 GHz.
A wireless phone system running at 900 MHz.
An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range.
An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range.
Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
The wireless TV system
56
New cards
Which technologies are used by the 802.11ac standard to increase network bandwidth? (Select two.)
Eight MIMO radio streams
160 MHz bonded channels
57
New cards
You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps.
Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period.
Which 802.11 standard will work BEST in this situation?
802.11n
58
New cards
Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)
2.4 GHz
5.75 GHz
59
New cards
How many total channels (non-overlapping) are available for 802.11a wireless networks?
24
60
New cards
How many total channels are available for 802.11g wireless networks?
11
61
New cards
You have configured a wireless access point to create a small network and configured all necessary parameters.
Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect.
What should you do?
Decrease the beacon interval.
62
New cards
You are an administrator of a growing network. You notice that the network you've created is broadcasting, but you can't ping systems on different segments. Which device should you use to fix this issue?
Network bridge
63
New cards
Which of the following wireless network protection methods prevents the wireless network name from being broadcast?
SSID broadcast
64
New cards
Which of the following features does WPA2 supply on a wireless network?
Encryption
65
New cards
Which network modes can typically be used for both 2.4 GHz and 5 GHz clients? (Select two.)
802.11ax only
802.11n only
66
New cards
You have configured a wireless access point to create a small network. For security reasons, you have disabled SSID broadcast.
From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network.
What should you do?
Configure a profile on the wireless client.
67
New cards
You want to connect a laptop computer running Windows to a wireless network.
The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled.
What should you do?
Configure the connection with a pre-shared key and AES encryption.
68
New cards
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components should be part of your design? (Select two.)
AES encryption
802.1x
69
New cards
You need to add security for your wireless network. You would like to use the most secure method.
Which method should you implement?
WPA2
70
New cards
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points.
You want to connect a laptop computer to the wireless network. Which of the following parameters do you need to configure on the laptop? (Select two.)
TKIP encryption
Pre-shared key
71
New cards
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz.
Which 802.11 standard works best in this situation?
802.11n
72
New cards
Which of the following uses a 2.4 GHz ISM band, has fast transmission rates, and has been used for applications like geocaching and health monitors?
Ant+
73
New cards
You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management.
Which of the following questions should you ask? (Select three.)
How many devices will need to be supported?
Which type of data will be transmitted on the network?
Is the size of the business expected to grow in the future?
74
New cards
Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?
Z-Wave
75
New cards
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults.
Which of the following might you suspect is the cause of the connectivity problems?
There are overlapping channels.
76
New cards
Which of the following should you include in your site survey kit?
A tall ladder
77
New cards
You are concerned that wireless access points might have been deployed within your organization without authorization.
What should you do? (Select two. Each response is a complete solution.)
Check the MAC addresses of devices that are connected to your wired switch.
Conduct a site survey.
78
New cards
Which of the following purposes do wireless site surveys fulfill? (Select two.)
Identify existing or potential sources of interference.
Identify the coverage area and preferred placement of access points.
79
New cards
Which of the following does an SNR higher than 1:1 indicate?
More signal than noise
80
New cards
Which of the following connects wired or wireless networks together?
Wireless bridge
81
New cards
Which of the following functions does a consumer-grade access point combine into a single device? (Select two.)
NAT
WAP
82
New cards
Which of the following is a limitation of consumer-grade wireless equipment?
It supports a maximum of 5-10 wireless clients at a time
83
New cards
Which of the following usually provides DHCP services to dynamically assign IP addressing information to wireless clients and connect the wireless network to the internal wired network and the internet?
Controllers
84
New cards
Which of the following can become a critical point of failure in a large wireless network infrastructure?
Controller
85
New cards
Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic?
Distributed wireless mesh infrastructure
86
New cards
Which of the following is a configuration in which a wireless controller is connected to all APs through a wired link?
Hub and spoke
87
New cards
Which of the following BEST describes roaming?
The ability to broadcast the same SSID across multiple APs.
88
New cards
Your manager has asked you to set up four independent APs and configure them with the same SSID, channel, and IP subnet. What should you enable to accomplish this?
Roaming
89
New cards
Which of the following do switches and wireless access points use to control access through a device?
MAC address filtering
90
New cards
You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process?
On a RADIUS server.
91
New cards
You're replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)
Configure devices to run in infrastructure mode.
Install a RADIUS server and use 802.1x authentication.
92
New cards
Which of the following wireless security methods uses a common shared key that's configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
93
New cards
Which of the following features are supplied by WPA2 on a wireless network?
Encryption
94
New cards
Which of the following provides security for wireless networks?
WPA
95
New cards
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests.
The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet.
What should you do?
Implement a captive portal.
96
New cards
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
Disable SSID broadcast.
97
New cards
Which of the following locations creates the greatest amount of interference for a wireless access point? (Select two.)
Near backup generators
Near cordless phones
98
New cards
Your company security policy states that wireless networks are not to be used because of the potential security risk they present.
One day you find that an employee has connected a wireless access point to the network in his office.
Which type of security risk is this?
Rogue access point
99
New cards
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works.
What is the MOST likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point.
100
New cards
A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem?
The client system has moved too far away from the access point.