1/239
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What is the word used to describe the ability to quickly adapt to market demands according to increased or decreased feature use within a system?
agility
What is the term used to describe when something does not work as promised or as planned?
failure
Clustering is the process of grouping similar resources together. What resources can be clustered? Choose all that apply.
Servers
Routers
Applications
Personal Computers
Servers
Routers
Applications
What is the software that creates and manages a virtual machine (VM) and allocates the use of hardware resources for the host and any of its guest VMs?
hypervisor
What are some advantages of virtualization? Choose all that apply.
efficient use of resources
licensing costs
cost and energy savings
fault and threat isolation
efficient use of resources
cost and energy savings
fault and threat isolation
What is the first layer of defense to prevent a MAC flooding attack? Choose all that apply.
disable physical ports
disable virtual ports
disable ephemeral ports
disable WAN port
disable physical ports
disable virtual ports
Orchestration is the automation of tasks to work together in a complex and lengthy workflow.
True
Cloud architecture provides different service model functions that can be customized to fit a client's needs, such as monitoring, storage, applications, and virtual desktops. What is that as a Service function called?
XaaS (Anything as a Service)
In which service mode are hardware resources provided virtually, including network infrastructure devices such as routing, switching, and DNS services?
IaaS (Infrastructure as a Service)
Hazel wants a switch to enhance her firewall's capabilities. The switch should provide advanced filtering and security functions. What type of switch matches those specifications?
layer 4 switch
Minor faults, such as a malfunctioning network interface card (NIC) on a router, can result in network outages.
True
Which device can be configured via a command-line interface or web-based management GUI (graphical user interface), and can sometimes be configured in groups?
managed switch
What type of pipeline specifically supports the continuous development of an application through the many iterations of improvements?
software pipeline
A key factor in maintaining the availability of network resources is fault tolerance. What is fault tolerance? Choose all that apply.
the capacity of a system to continue performing despite an unexpected hardware or software malfunction
the process of duplicating critical network components, such as servers or storage devices, to ensure redundancy and minimize the risk of data loss
What cloud services can be shared between multiple organizations, but are not available to the public?
community cloud
Jessie was a system administrator at a large company's Network Operations Center (NOC). Occasionally, employees company-wide would complain about the slow Internet service or that it was temporarily unavailable. As the complaints were widespread and the issue wasn't localized, Jessie investigated the problem at the NOC level. They determined that a router was causing the issue. From a fault tolerance perspective, what would this issue be considered?
fault
What is the command for disabling a port on a Cisco switch?
shutdown
What does the term HA (high availability) refer to?
a system that functions reliably nearly all the time
Emie is the owner of an e-commerce company that is experiencing rapid growth. Her company has recently launched a website that is managed by racks of servers. These servers are responsible for a variety of tasks, including taking orders, processing payments, issuing refunds, and updating the website's content on a daily basis. When a client types in the website URL, they are directed to the website. From the client's perspective, it appears that the website is powered by a single server. However, in reality, there are multiple servers working together to ensure that the website functions smoothly. How does this process happen? Choose all that apply.
the client gets to choose which server they work with
web client directs request to a single VIP (virtual IP address
racks of servers are clustered to look like one server
load balancing directs traffic evenly between the servers
Racks of servers are clustered to look like one server.
Load balancing directs traffic evenly between the servers
In what type of situation is the round-robin rule algorithm used?
load balancing
Each leaf switch is connected to every spine switch; therefore, messages must traverse fewer hops to reach their destination. What does it mean when messages need fewer hops to reach their destination?
a decrease in latency
This plane is not a typical layer for network communication, but it is considered a part of the control plane. Its purpose is to enable network administrators to remotely manage network devices, monitor them, and analyze data collected about the devices. What is this plane called in other contexts?
management plane
The overall network design, the devices involved, how they're configured, the services implemented to support the network, and the way that devices are connected to the network are called a network's architecture.
true
Juan's company uses the hierarchical three-tiered network architecture approach developed by Cisco and other manufacturers. Juan is currently in the process of purchasing switches to connect directly to hosts, including servers, printers, and workstations. What type of switches are these? Choose all that apply.
distribution layer
access layer
edge layer
core layer
access layer
edge layer
What is EoR (end of row) switching, and what are some of its benefits? Choose all that apply.
EoR switching places several leaf switches in a rack at the beginning of each row of racks or at the end of each row.
This approach requires fewer switches (and, therefore, fewer hops for much of the network's traffic) and less rack space.
What is ToR (top of rack) switching, and what are some of its benefits? Choose all that apply.
The ToR switches connect all other devices in the rack to the rest of the network.
Their location in the rack often provides the best accessibility and cable management.
What is the benefit of keeping the bulk of a network's cabling within the rack for very short connections? Choose all that apply.
- Network requires less cable overall
- Very high speed cable can make very short cable runs
- Provides increased flexibility in the network design
Angela has eight operating systems she wants to run, but she does not have the hardware to support each of them. However, she has an older Windows computer with virtualization capabilities. The computer she has consists of 16 Gb of RAM, a 100 Gb hard drive, an on-board video card, and all other hardware is standard to a home PC. What issues might she face as she tries to install these operating systems? Choose all that apply.
- the hypervisor may not support all guest operating systems
- not enough host system resources
Mackie plans to set up a test network that will incorporate all the operating systems used by his company. He wants to ensure that any actions taken on this network will not affect the production network in any way. What should Mackie do?
create a virtual network and set it to host-only mode
In what cloud deployment are services established on an organization's own servers in its own data center, or services are established remotely for a single organization's private use and made available to authorized users over a WAN connection through some type of remote access?
private cloud
Software-defined networking (SDN) is a centralized approach to networking that removes most of the decision-making power from network devices. At what level is this responsibility handled?
software level
To which standard does Link Aggregation Control Protocol (LACP) now belong?
802.1ax
Virtualization is an actual, or logical, version of something rather than the physical version.
False
In the world of networking, what does the term "availability" mean?
how consistently and reliably a resource can be accessed by authorized personnel
During software development, developers often need to access multiple platforms, which include the operating system, the runtime libraries or modules provided by the OS to applications, as well as the hardware on which the OS runs. Which service model would be the better option?
PaaS (Platform as a Service)
What status listed below indicates that a switch port is down? Choose all that apply.
- error disabled
- suspended
- administratively down
Software-defined networking (SDN) enables automatic network configuration based on changing conditions and application requirements. What is this capability called?
application aware networking
While a developer writes changes to the code, the changes can be uploaded into the branch that the developer is working on. What is the process of uploading these changes called?
commit
A large e-commerce company had a server go down. It was an important server that processes orders. The company has load balancing in place and clustered its servers together. What happened when that server when down?
no major impact
One way to consider availability is by measuring a system's or network's uptime, which is the duration or percentage of time that it functions normally between failures. What is the system downtime per year if the uptime is 99.99%?
52 minutes, 35 seconds
SANs use the same IP technologies as standard IT networks.
False
What needs to be configured on a network to allow routers, firewalls, or layer 3 switches to forward UDP traffic across broadcast domains and enable centralization of key network services?
UDP forwarding
When traffic moves between two VLANs, it must pass through a router. What is the term for this process?
inter-VLAN routing
This logical appliance provides filtered and protected access from resources in the private subnet to services on the Internet. However, Internet-based resources are not able to initiate contact with the private subnet or access the protected resources directly. What is this logical appliance called?
NAT gateway
In this configuration error, a group of nodes was added to a VLAN, but the rest have been cut off from the network. What type of configuration error is this?
VLAN isolation
A benefit of cloud hosted resources is that a company can put those resources anywhere in the world in regions that are closest to the point of use.
True
How many subnets can the subnet mask 255.255.255.240 create?
16
Which type of VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency?
voice
In a storage area network (SAN), storage drives are located in one or more separate devices, possibly even in a different rack or a different room. The network connections between servers and SAN devices must support extremely high data throughput. To maximize throughput, SAN storage relies on specific networking technologies. What are these technologies? Choose all that apply.
a. FC (Fibre Channel)
b. BNC Ethernet
c. FCoE (Fibre Channel over Ethernet)
d. iSCSI (Internet SCSI)
- FC (Fibre Channel)
- FCoE (Fibre Channel over Ethernet)
- iSCSI (Internet SCSI)
If one storage device within a storage area network (SAN) suffers a fault, data is automatically retrieved from elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic. What is this technique called?
multipathing
What is the purpose of a content delivery network (CDN)? Choose all that apply.
- reduces latency
- delivers data closer to the user
When calculating subnets either manually or by using subnet tables, the following types of information will be needed. Some of this information is initially known, while some of it must be determined: If the number of subnets and the number of host addresses per subnet is known, what else must be determined? Choose all that apply.
network ID for each subnet
number of routers per subnet
broadcast address for each subnet
range of host addresses
- broadcast address for each subnet
- network ID for each subnet
- range of host addresses
Which type of VLAN is typically preconfigured on a switch and initially includes all the switch's ports?
default
What is the term for a resource requiring detailed zoning and object-level security?
micro-segmentation
Edge computing runs compute resources in physical locations closer to the user, and often, this data and compute caching happen on edge devices rather than on traditional servers.
True
What do the last four blocks (64 bits) identify in an IPv6 address?
host interface
Enlarged headers are necessary to support VXLANs, as they require a much larger message on the network than the standard 1500-byte message defined by the MTU (maximum transmission unit). How do networks manage these larger messages?
networks supporting VXLANs must be configured with a larger MTU
Which subnet mask is used for a class B network?
11111111 11111111 00000000 00000000
Which type of VLAN carries user-generated traffic, such as email, web browsing, or database updates?
data
Hackers sometimes take advantage of the way VLANs are tagged to implement an attack. The attacker generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software. What is this attack called?
VLAN hopping
What are some ways to mitigate VLAN hopping and enhance network segmentation? Choose all that apply.
Configure all ports as trunk ports on switches that carry traffic from multiple VLANs.
Do not use the default VLAN.
Disable auto - trunking.
Change the native VLAN to an unused VLAN ID
Do not use the default VLAN.
Disable auto-trunking.
Change the native VLAN to an unused VLAN ID.
Which layers of the OSI model play a part in network segmentation? Choose from the list below.
7. Application Layer 6. Presentation Layer
5. Session Layer 4. Transport Layer
3. Network Layer 2. Data-Link Layer
1. Physical Layer
3, 2, 1
Variable Length Subnet Mask (VLSM) is an efficient way to define IP address spaces on a network. However, in reality, it is not a good idea to configure subnets so tightly. Why is it not recommended to configure subnets so tightly? Choose all that apply.
routers cannot function properly
network addresses may overlap
possible address pool exhaustion
little room for future growth
possible address pool exhaustion
little room for future growth
Segmentation is crucial for cloud network security, and it can be achieved through subnet configuration. What are the different types of subnets? Choose all that apply.
IG subnet
private subnet
NAT subnet
public subnet
private subnet
public subnet
What is the most popular protocol for exchanging VLAN information over trunks?
Cisco's VTP (VLAN Trunk Protocol)
Operational Technology (OT) specialists often focus on different priorities than Information Technology (IT) specialists, as they involve varying levels of certain types of risks. How are OT risks defined?
physical systems' vulnerabilities in response to interruptions caused by a breach
Jason's company has purchased a new building and will be relocating part of the marketing and engineering teams to it. Jason wants to ensure that the departments will have access to the same resources as those in the original building. How should Jason set up the office network in the new building?
managed switches with VLANs
Howard was speaking with his IT manager when the subject arose regarding VLANs. The company was about to add at least two VLANs due to expansion. Howard, who is new to VLANs, asked his IT manager which type of VLANs pose the greatest security risk. Which VLANs did the IT manager pick? Choose all that apply.
Data VLAN
Native VLAN
Voice VLAN
Management VLAN
- Management VLAN
- Native VLAN
Sandy has an internal /24 network. Their address starts at 192.198.120.0 and ends at 192.198.120.255. In order, what do the numbers 0 and 255 stand for?
network address (Network ID) and broadcast address
A VLAN configuration error can occur for various reasons, such as connecting a device to the wrong switch port or misconfiguring the client authentication process, resulting in the allocation of a VLAN to a device before the authentication process is complete. What type of configuration error is this?
incorrect VLAN assignment
Daniel's company just switched over to AWS services EC2 cloud instance. He needs to work remotely, on a host server in their private subnet, but there is a NAT gateway set up within the company's EC2 cloud. How can Daniel work remotely while having the NAT gateway in place?
Create a bastion host/jump box, in the public subnet.
What type of data storage systems do small networks rely on? Choose all that apply.
storage area network (SAN)
redundant array of inexpensive disks (RAID)
network attached storage (NAS)
common network file system (CIFS)
network attached storage (NAS) ONLY ONE THAT IS FOR SURE RIGHT
redundant array of inexpensive disks (RAID)
common network file system (CIFS)
A computer is connected to a switch port and then to a server on another switch port, but the computer is not connecting properly to the server. What could the error be?
incorrect port mode
George is planning a new network and is going to put all his servers in one rack and keep the broadcast traffic to a minimum. What is the best way for George to accomplish this goal?
put servers into one network segment
What protocol does virtual extensible LAN (VXLAN) use to function at OSI layer 4?
UDP (User Datagram Protocol)
On which OSI layer does VLAN traffic traverse?
layer 2
When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single router port. What is each of these logical interfaces on one physical interface called?
subinterface
The Internet is referred to by more than one zone name. What are those names? Choose all that apply.
trusted zone
untrusted zone
demilitarized zone
public zone
untrusted zone
public zone
How do VLAN clients receive the appropriate IP address assignments from the subnet's range of addresses portioned to each VLAN?
a. Run a DHCP server for the entire network and have each
subinterface configured with its own subnetted range of IP addresses.
b. Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet.
c. Have the router provide DHCP services with each subinterface
and use a DHCP relay agent to help sort DHCP requests
by subnet.
d. Have the router provide DHCP services with each subinterface
configured with its own subnetted range of IP addresses
Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet
How is subnetting in IPv6 simpler than subnetting in IPv4, and how does it differ from IPv4? Choose all that apply.
A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.
D) IPv6 works at a different level of the OSI model.
A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.
What command displays a router's routing table?
show ip route
What factors can determine the size of a cell in cellular service? Choose all that apply.
cellular traffic
population
topology
True story: Alexis needed high-bandwidth Internet access because she teaches online and frequently uses the Internet alongside Zoom. She purchased the high-speed package from her cable TV provider, which offered her 500 Mbps download speed and 20 Mbps upload speed. She made sure that her equipment was up-to-date to handle the speed increase. After the modem was installed, she downloaded a software program called Speedtest to confirm that she was getting the speed she was paying for.--CUT--She contacted her carrier to ask about the issue and was told that she was getting the service she paid for. Why are Alexis' speeds fluctuating so much?
It was the "best effort" by the ISP.
What is the term for the individual geographical locations connected by a WAN?
WAN site
What is the purpose of an ACL (access control list)?
It acts as a filter to instruct the router to permit or deny traffic.
Eliana experienced intermittent traffic issues with one of her routers, allowing some traffic that shouldn't be permitted while denying other traffic that should be allowed. What could be causing this issue?
misconfigured ACL
Which of the following devices are used to connect WANs? Choose all that apply.
CSU/DSU
Router
Which type of dedicated WAN connection enables multiple types of layer 3 protocols to travel over any one of several connection-oriented layer 2 protocols, allowing any connectivity option for each site that is appropriate while centrally managing bandwidth between each site?
MPLS (multiprotocol label switching)
What is the common routing issue called where NAT (network address translation) and firewalls cannot see traffic in both directions of a conversation, and as a result, they cannot properly apply filtering rules and might incorrectly reject outgoing traffic that should have been approved?
asymmetrical routing
In order to reach a reasonable level of availability and effectiveness, how must 5G antennas be placed?
close proximity
What happens when no matching route exists for a message?
The message will be dropped.
What are some of the benefits of an SD-WAN (software-defined wide area network)? Choose all that apply.
transport agnostic
zero-touch provisioning
AAR (application-aware routing)
4G (fourth generation) cellular service is characterized by an all-IP network for both data and voice transmission. However, speed has been an issue. What generation of cellular service finally brought about true 4G speeds?
LTE-A (LTE-Advanced)
What are the commands to add a gateway of last resort to a router? Choose all that apply.
ip default-gateway
ip default-network
ip route 0.0.0.0 0.0.0.0
Which type of firewall is placed on the edge of the private network, to monitor the connection between a private network and a public network, such as the Internet?
network-based firewall
Even with the fastest data plans, there is always one factor that slows down the data in a home office. What is it?
the last mile
Cells can be misshapen due to a variety of reasons. What are some of those reasons? Choose all that apply
terrain
EMI (electromagnetic interference)
antenna radiation patterns
In the routing table below what does the "D" in line 5 stand for?
S* 0.0.0.0/0 [1/0] via 192.168.1.110.0.0.0/8 is variably subnetted, 6 subnets, 2 masks
1. C 10.1.1.0/24 is directly connected, GigabitEthernet0/1
2. L 10.1.1.1/32 is directly connected, GigabitEthernet0/1
3. C 10.1.2.0/24 is directly connected, GigabitEthernet0/2
4. L 10.1.2.1/32 is directly connected, GigabitEthernet0/2
5. D 10.2.0.0/16 [90/30720] via 10.1.1.2, 00:00:05, GigabitEthernet0/1
6. O 10.3.0.0/16 [110/20] via 10.1.2.2, 00:00:10, GigabitEthernet0/2
7. 192.168.0.0/16 is variably subnetted, 2 subnets, 2 masks
8. C 192.168.1.0/24 is directly connected, GigabitEthernet0/0
9. L 192.168.1.1/32 is directly connected, GigabitEthernet0/0
protocol (EIGRP)
Compared to other wireless WAN options, satellite services are faster and suffer less latency.
FALSE
When a mobile device switches to a different antenna, its communication may change frequencies or even carriers between cells. This transition usually occurs without the user's knowledge or awareness. What is this transition called?
handoff