final computer networking

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/239

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

240 Terms

1
New cards

What is the word used to describe the ability to quickly adapt to market demands according to increased or decreased feature use within a system?

agility

2
New cards

What is the term used to describe when something does not work as promised or as planned?

failure

3
New cards

Clustering is the process of grouping similar resources together. What resources can be clustered? Choose all that apply.
Servers
Routers
Applications
Personal Computers

Servers
Routers
Applications

4
New cards

What is the software that creates and manages a virtual machine (VM) and allocates the use of hardware resources for the host and any of its guest VMs?

hypervisor

5
New cards

What are some advantages of virtualization? Choose all that apply.
efficient use of resources
licensing costs
cost and energy savings
fault and threat isolation

efficient use of resources
cost and energy savings
fault and threat isolation

6
New cards

What is the first layer of defense to prevent a MAC flooding attack? Choose all that apply.
disable physical ports
disable virtual ports
disable ephemeral ports
disable WAN port

disable physical ports
disable virtual ports

7
New cards

Orchestration is the automation of tasks to work together in a complex and lengthy workflow.

True

8
New cards

Cloud architecture provides different service model functions that can be customized to fit a client's needs, such as monitoring, storage, applications, and virtual desktops. What is that as a Service function called?

XaaS (Anything as a Service)

9
New cards

In which service mode are hardware resources provided virtually, including network infrastructure devices such as routing, switching, and DNS services?

IaaS (Infrastructure as a Service)

10
New cards

Hazel wants a switch to enhance her firewall's capabilities. The switch should provide advanced filtering and security functions. What type of switch matches those specifications?

layer 4 switch

11
New cards

Minor faults, such as a malfunctioning network interface card (NIC) on a router, can result in network outages.

True

12
New cards

Which device can be configured via a command-line interface or web-based management GUI (graphical user interface), and can sometimes be configured in groups?

managed switch

13
New cards

What type of pipeline specifically supports the continuous development of an application through the many iterations of improvements?

software pipeline

14
New cards

A key factor in maintaining the availability of network resources is fault tolerance. What is fault tolerance? Choose all that apply.

the capacity of a system to continue performing despite an unexpected hardware or software malfunction

the process of duplicating critical network components, such as servers or storage devices, to ensure redundancy and minimize the risk of data loss

15
New cards

What cloud services can be shared between multiple organizations, but are not available to the public?

community cloud

16
New cards

Jessie was a system administrator at a large company's Network Operations Center (NOC). Occasionally, employees company-wide would complain about the slow Internet service or that it was temporarily unavailable. As the complaints were widespread and the issue wasn't localized, Jessie investigated the problem at the NOC level. They determined that a router was causing the issue. From a fault tolerance perspective, what would this issue be considered?

fault

17
New cards

What is the command for disabling a port on a Cisco switch?

shutdown

18
New cards

What does the term HA (high availability) refer to?

a system that functions reliably nearly all the time

19
New cards

Emie is the owner of an e-commerce company that is experiencing rapid growth. Her company has recently launched a website that is managed by racks of servers. These servers are responsible for a variety of tasks, including taking orders, processing payments, issuing refunds, and updating the website's content on a daily basis. When a client types in the website URL, they are directed to the website. From the client's perspective, it appears that the website is powered by a single server. However, in reality, there are multiple servers working together to ensure that the website functions smoothly. How does this process happen? Choose all that apply.


the client gets to choose which server they work with
web client directs request to a single VIP (virtual IP address
racks of servers are clustered to look like one server
load balancing directs traffic evenly between the servers

Racks of servers are clustered to look like one server.
Load balancing directs traffic evenly between the servers

20
New cards

In what type of situation is the round-robin rule algorithm used?

load balancing

21
New cards

Each leaf switch is connected to every spine switch; therefore, messages must traverse fewer hops to reach their destination. What does it mean when messages need fewer hops to reach their destination?

a decrease in latency

22
New cards

This plane is not a typical layer for network communication, but it is considered a part of the control plane. Its purpose is to enable network administrators to remotely manage network devices, monitor them, and analyze data collected about the devices. What is this plane called in other contexts?

management plane

23
New cards

The overall network design, the devices involved, how they're configured, the services implemented to support the network, and the way that devices are connected to the network are called a network's architecture.

true

24
New cards

Juan's company uses the hierarchical three-tiered network architecture approach developed by Cisco and other manufacturers. Juan is currently in the process of purchasing switches to connect directly to hosts, including servers, printers, and workstations. What type of switches are these? Choose all that apply.

distribution layer
access layer
edge layer
core layer

access layer
edge layer

25
New cards

What is EoR (end of row) switching, and what are some of its benefits? Choose all that apply.

EoR switching places several leaf switches in a rack at the beginning of each row of racks or at the end of each row.

This approach requires fewer switches (and, therefore, fewer hops for much of the network's traffic) and less rack space.

26
New cards

What is ToR (top of rack) switching, and what are some of its benefits? Choose all that apply.

The ToR switches connect all other devices in the rack to the rest of the network.

Their location in the rack often provides the best accessibility and cable management.

27
New cards

What is the benefit of keeping the bulk of a network's cabling within the rack for very short connections? Choose all that apply.

- Network requires less cable overall

- Very high speed cable can make very short cable runs

- Provides increased flexibility in the network design

28
New cards

Angela has eight operating systems she wants to run, but she does not have the hardware to support each of them. However, she has an older Windows computer with virtualization capabilities. The computer she has consists of 16 Gb of RAM, a 100 Gb hard drive, an on-board video card, and all other hardware is standard to a home PC. What issues might she face as she tries to install these operating systems? Choose all that apply.

- the hypervisor may not support all guest operating systems

- not enough host system resources

29
New cards

Mackie plans to set up a test network that will incorporate all the operating systems used by his company. He wants to ensure that any actions taken on this network will not affect the production network in any way. What should Mackie do?

create a virtual network and set it to host-only mode

30
New cards

In what cloud deployment are services established on an organization's own servers in its own data center, or services are established remotely for a single organization's private use and made available to authorized users over a WAN connection through some type of remote access?

private cloud

31
New cards

Software-defined networking (SDN) is a centralized approach to networking that removes most of the decision-making power from network devices. At what level is this responsibility handled?

software level

32
New cards

To which standard does Link Aggregation Control Protocol (LACP) now belong?

802.1ax

33
New cards

Virtualization is an actual, or logical, version of something rather than the physical version.

False

34
New cards

In the world of networking, what does the term "availability" mean?

how consistently and reliably a resource can be accessed by authorized personnel

35
New cards

During software development, developers often need to access multiple platforms, which include the operating system, the runtime libraries or modules provided by the OS to applications, as well as the hardware on which the OS runs. Which service model would be the better option?

PaaS (Platform as a Service)

36
New cards

What status listed below indicates that a switch port is down? Choose all that apply.

- error disabled

- suspended

- administratively down

37
New cards

Software-defined networking (SDN) enables automatic network configuration based on changing conditions and application requirements. What is this capability called?

application aware networking

38
New cards

While a developer writes changes to the code, the changes can be uploaded into the branch that the developer is working on. What is the process of uploading these changes called?

commit

39
New cards

A large e-commerce company had a server go down. It was an important server that processes orders. The company has load balancing in place and clustered its servers together. What happened when that server when down?

no major impact

40
New cards

One way to consider availability is by measuring a system's or network's uptime, which is the duration or percentage of time that it functions normally between failures. What is the system downtime per year if the uptime is 99.99%?

52 minutes, 35 seconds

41
New cards

SANs use the same IP technologies as standard IT networks.

False

42
New cards

What needs to be configured on a network to allow routers, firewalls, or layer 3 switches to forward UDP traffic across broadcast domains and enable centralization of key network services?

UDP forwarding

43
New cards

When traffic moves between two VLANs, it must pass through a router. What is the term for this process?

inter-VLAN routing

44
New cards

This logical appliance provides filtered and protected access from resources in the private subnet to services on the Internet. However, Internet-based resources are not able to initiate contact with the private subnet or access the protected resources directly. What is this logical appliance called?

NAT gateway

45
New cards

In this configuration error, a group of nodes was added to a VLAN, but the rest have been cut off from the network. What type of configuration error is this?

VLAN isolation

46
New cards

A benefit of cloud hosted resources is that a company can put those resources anywhere in the world in regions that are closest to the point of use.

True

47
New cards

How many subnets can the subnet mask 255.255.255.240 create?

16

48
New cards

Which type of VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency?

voice

49
New cards

In a storage area network (SAN), storage drives are located in one or more separate devices, possibly even in a different rack or a different room. The network connections between servers and SAN devices must support extremely high data throughput. To maximize throughput, SAN storage relies on specific networking technologies. What are these technologies? Choose all that apply.
a. FC (Fibre Channel)
b. BNC Ethernet
c. FCoE (Fibre Channel over Ethernet)
d. iSCSI (Internet SCSI)

- FC (Fibre Channel)

- FCoE (Fibre Channel over Ethernet)

- iSCSI (Internet SCSI)

50
New cards

If one storage device within a storage area network (SAN) suffers a fault, data is automatically retrieved from elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic. What is this technique called?

multipathing

51
New cards

What is the purpose of a content delivery network (CDN)? Choose all that apply.

- reduces latency

- delivers data closer to the user

52
New cards

When calculating subnets either manually or by using subnet tables, the following types of information will be needed. Some of this information is initially known, while some of it must be determined: If the number of subnets and the number of host addresses per subnet is known, what else must be determined? Choose all that apply.

network ID for each subnet
number of routers per subnet
broadcast address for each subnet
range of host addresses

- broadcast address for each subnet

- network ID for each subnet

- range of host addresses

53
New cards

Which type of VLAN is typically preconfigured on a switch and initially includes all the switch's ports?

default

54
New cards

What is the term for a resource requiring detailed zoning and object-level security?

micro-segmentation

55
New cards

Edge computing runs compute resources in physical locations closer to the user, and often, this data and compute caching happen on edge devices rather than on traditional servers.

True

56
New cards

What do the last four blocks (64 bits) identify in an IPv6 address?

host interface

57
New cards

Enlarged headers are necessary to support VXLANs, as they require a much larger message on the network than the standard 1500-byte message defined by the MTU (maximum transmission unit). How do networks manage these larger messages?

networks supporting VXLANs must be configured with a larger MTU

58
New cards

Which subnet mask is used for a class B network?

11111111 11111111 00000000 00000000

59
New cards

Which type of VLAN carries user-generated traffic, such as email, web browsing, or database updates?

data

60
New cards

Hackers sometimes take advantage of the way VLANs are tagged to implement an attack. The attacker generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software. What is this attack called?

VLAN hopping

61
New cards

What are some ways to mitigate VLAN hopping and enhance network segmentation? Choose all that apply.

Configure all ports as trunk ports on switches that carry traffic from multiple VLANs.

Do not use the default VLAN.

Disable auto - trunking.

Change the native VLAN to an unused VLAN ID

Do not use the default VLAN.

Disable auto-trunking.

Change the native VLAN to an unused VLAN ID.

62
New cards

Which layers of the OSI model play a part in network segmentation? Choose from the list below.

7. Application Layer 6. Presentation Layer

5. Session Layer 4. Transport Layer

3. Network Layer 2. Data-Link Layer

1. Physical Layer

3, 2, 1

63
New cards

Variable Length Subnet Mask (VLSM) is an efficient way to define IP address spaces on a network. However, in reality, it is not a good idea to configure subnets so tightly. Why is it not recommended to configure subnets so tightly? Choose all that apply.

routers cannot function properly

network addresses may overlap

possible address pool exhaustion

little room for future growth

possible address pool exhaustion

little room for future growth

64
New cards

Segmentation is crucial for cloud network security, and it can be achieved through subnet configuration. What are the different types of subnets? Choose all that apply.

IG subnet

private subnet

NAT subnet

public subnet

private subnet

public subnet

65
New cards

What is the most popular protocol for exchanging VLAN information over trunks?

Cisco's VTP (VLAN Trunk Protocol)

66
New cards

Operational Technology (OT) specialists often focus on different priorities than Information Technology (IT) specialists, as they involve varying levels of certain types of risks. How are OT risks defined?

physical systems' vulnerabilities in response to interruptions caused by a breach

67
New cards

Jason's company has purchased a new building and will be relocating part of the marketing and engineering teams to it. Jason wants to ensure that the departments will have access to the same resources as those in the original building. How should Jason set up the office network in the new building?

managed switches with VLANs

68
New cards

Howard was speaking with his IT manager when the subject arose regarding VLANs. The company was about to add at least two VLANs due to expansion. Howard, who is new to VLANs, asked his IT manager which type of VLANs pose the greatest security risk. Which VLANs did the IT manager pick? Choose all that apply.

Data VLAN

Native VLAN

Voice VLAN

Management VLAN

- Management VLAN

- Native VLAN

69
New cards

Sandy has an internal /24 network. Their address starts at 192.198.120.0 and ends at 192.198.120.255. In order, what do the numbers 0 and 255 stand for?

network address (Network ID) and broadcast address

70
New cards

A VLAN configuration error can occur for various reasons, such as connecting a device to the wrong switch port or misconfiguring the client authentication process, resulting in the allocation of a VLAN to a device before the authentication process is complete. What type of configuration error is this?

incorrect VLAN assignment

71
New cards

Daniel's company just switched over to AWS services EC2 cloud instance. He needs to work remotely, on a host server in their private subnet, but there is a NAT gateway set up within the company's EC2 cloud. How can Daniel work remotely while having the NAT gateway in place?

Create a bastion host/jump box, in the public subnet.

72
New cards

What type of data storage systems do small networks rely on? Choose all that apply.

storage area network (SAN)

redundant array of inexpensive disks (RAID)

network attached storage (NAS)

common network file system (CIFS)

network attached storage (NAS) ONLY ONE THAT IS FOR SURE RIGHT

redundant array of inexpensive disks (RAID)

common network file system (CIFS)

73
New cards

A computer is connected to a switch port and then to a server on another switch port, but the computer is not connecting properly to the server. What could the error be?

incorrect port mode

74
New cards

George is planning a new network and is going to put all his servers in one rack and keep the broadcast traffic to a minimum. What is the best way for George to accomplish this goal?

put servers into one network segment

75
New cards

What protocol does virtual extensible LAN (VXLAN) use to function at OSI layer 4?

UDP (User Datagram Protocol)

76
New cards

On which OSI layer does VLAN traffic traverse?

layer 2

77
New cards

When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single router port. What is each of these logical interfaces on one physical interface called?

subinterface

78
New cards

The Internet is referred to by more than one zone name. What are those names? Choose all that apply.

trusted zone
untrusted zone
demilitarized zone
public zone

untrusted zone
public zone

79
New cards

How do VLAN clients receive the appropriate IP address assignments from the subnet's range of addresses portioned to each VLAN?

a. Run a DHCP server for the entire network and have each
subinterface configured with its own subnetted range of IP addresses.

b. Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet.

c. Have the router provide DHCP services with each subinterface
and use a DHCP relay agent to help sort DHCP requests
by subnet.

d. Have the router provide DHCP services with each subinterface
configured with its own subnetted range of IP addresses

Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet

80
New cards

How is subnetting in IPv6 simpler than subnetting in IPv4, and how does it differ from IPv4? Choose all that apply.
A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.
D) IPv6 works at a different level of the OSI model.

A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.

81
New cards

What command displays a router's routing table?

show ip route

82
New cards

What factors can determine the size of a cell in cellular service? Choose all that apply.

cellular traffic

population

topology

83
New cards

True story: Alexis needed high-bandwidth Internet access because she teaches online and frequently uses the Internet alongside Zoom. She purchased the high-speed package from her cable TV provider, which offered her 500 Mbps download speed and 20 Mbps upload speed. She made sure that her equipment was up-to-date to handle the speed increase. After the modem was installed, she downloaded a software program called Speedtest to confirm that she was getting the speed she was paying for.--CUT--She contacted her carrier to ask about the issue and was told that she was getting the service she paid for. Why are Alexis' speeds fluctuating so much?

It was the "best effort" by the ISP.

84
New cards

What is the term for the individual geographical locations connected by a WAN?

WAN site

85
New cards

What is the purpose of an ACL (access control list)?

It acts as a filter to instruct the router to permit or deny traffic.

86
New cards

Eliana experienced intermittent traffic issues with one of her routers, allowing some traffic that shouldn't be permitted while denying other traffic that should be allowed. What could be causing this issue?

misconfigured ACL

87
New cards

Which of the following devices are used to connect WANs? Choose all that apply.

CSU/DSU

Router

88
New cards

Which type of dedicated WAN connection enables multiple types of layer 3 protocols to travel over any one of several connection-oriented layer 2 protocols, allowing any connectivity option for each site that is appropriate while centrally managing bandwidth between each site?

MPLS (multiprotocol label switching)

89
New cards

What is the common routing issue called where NAT (network address translation) and firewalls cannot see traffic in both directions of a conversation, and as a result, they cannot properly apply filtering rules and might incorrectly reject outgoing traffic that should have been approved?

asymmetrical routing

90
New cards

In order to reach a reasonable level of availability and effectiveness, how must 5G antennas be placed?

close proximity

91
New cards

What happens when no matching route exists for a message?

The message will be dropped.

92
New cards

What are some of the benefits of an SD-WAN (software-defined wide area network)? Choose all that apply.

transport agnostic

zero-touch provisioning
AAR (application-aware routing)

93
New cards

4G (fourth generation) cellular service is characterized by an all-IP network for both data and voice transmission. However, speed has been an issue. What generation of cellular service finally brought about true 4G speeds?

LTE-A (LTE-Advanced)

94
New cards

What are the commands to add a gateway of last resort to a router? Choose all that apply.

ip default-gateway

ip default-network

ip route 0.0.0.0 0.0.0.0

95
New cards

Which type of firewall is placed on the edge of the private network, to monitor the connection between a private network and a public network, such as the Internet?

network-based firewall

96
New cards

Even with the fastest data plans, there is always one factor that slows down the data in a home office. What is it?

the last mile

97
New cards

Cells can be misshapen due to a variety of reasons. What are some of those reasons? Choose all that apply

terrain

EMI (electromagnetic interference)

antenna radiation patterns

98
New cards

In the routing table below what does the "D" in line 5 stand for?

S* 0.0.0.0/0 [1/0] via 192.168.1.110.0.0.0/8 is variably subnetted, 6 subnets, 2 masks

1. C 10.1.1.0/24 is directly connected, GigabitEthernet0/1

2. L 10.1.1.1/32 is directly connected, GigabitEthernet0/1

3. C 10.1.2.0/24 is directly connected, GigabitEthernet0/2

4. L 10.1.2.1/32 is directly connected, GigabitEthernet0/2

5. D 10.2.0.0/16 [90/30720] via 10.1.1.2, 00:00:05, GigabitEthernet0/1

6. O 10.3.0.0/16 [110/20] via 10.1.2.2, 00:00:10, GigabitEthernet0/2

7. 192.168.0.0/16 is variably subnetted, 2 subnets, 2 masks

8. C 192.168.1.0/24 is directly connected, GigabitEthernet0/0

9. L 192.168.1.1/32 is directly connected, GigabitEthernet0/0

protocol (EIGRP)

99
New cards

Compared to other wireless WAN options, satellite services are faster and suffer less latency.

FALSE

100
New cards

When a mobile device switches to a different antenna, its communication may change frequencies or even carriers between cells. This transition usually occurs without the user's knowledge or awareness. What is this transition called?

handoff