LVM Lab Final Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Which tier in the three-tiered network is responsible for routing traffic in and out of a network?

Core

2
New cards

At which layer in Software Defined Network (SDN) will you find a firewall?

Application layer

3
New cards

How many tiers are there in the spine and leaf network architecture?

2

4
New cards

The traffic that enters into a network is known as the ___________ traffic.

Southbound

5
New cards

Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?

Internet Small Computer Systems Interface (iSCSI)

6
New cards

When configuring a vNIC to obtain IP addressing from its host, which choice is used?

Nat mode

7
New cards

When configuring a vNIC, which choice is used to allow VMs on the same host to communicate but NOT with other network nodes?

Host-Only mode

8
New cards

When configuring a vNIC to access a physical network using the host machine's NIC, which choice is used?

Bridged

9
New cards

A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file, web and database servers be best managed?

Both

10
New cards

Merging physical and virtual network architecture is known by what acronym?

NFV

11
New cards

Which choice is a good reason to segment a network?
geography.
departments.
device types.
all of the above.

All of the above

12
New cards

Network segments that are more accessible to the internet are known by what new term?
DIZ
Screened Subnet
Enhanced Subnet
None of these

Screened Subnet

13
New cards

An IPv4 address is presented in the dotted quad format consisting of four decimal values, separated by dots. What is the highest decimal value assignable to one of the quads?
102
284
155
255

255

14
New cards

To Improve performance and relieve congestion, you are going to create specialized subnets for high volume segments. Which class C subnet mask would you use?
/28
/29
/30
/32

/29

15
New cards

How would the decimal number 4 be represented as a binary value? Enter your answer in the space provided.

100

16
New cards

How many ports does your switch have?

28 ports

17
New cards

What is your switch's current firmware version?

1.0.1.4

18
New cards

How many VLANs are currently configured on the switch?

10

19
New cards

Which one is the default VLAN?

1

20
New cards

Which tier in the three-tiered network is responsible for routing traffic in and out of a network?

Core

21
New cards

At which layer in Software Defined Network (SDN) will you find a firewall?

Application layer

22
New cards

How many tiers are there in the spine and leaf network architecture?

2

23
New cards

The traffic that enters into a network is known as the ___________ traffic.

Southbound

24
New cards

Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?

Internet Small Computer Systems Interface (iSCSI)

25
New cards

You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?

A: DHCP Snooping

26
New cards

You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?

A: Create Private VLANs

27
New cards

You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?

A: Move the ports from the default VLAN to a new, unused VLAN and then disable them

28
New cards

Which of the following versions of SNMP are considered unsecure? [Choose all that apply]

A: SNMPv2c
SNMPv1

29
New cards

You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?

A: Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement

30
New cards

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?

A: Check the IP routing table

Explanation: If you are unable to ping host B, located in a different location from host A, it means that the routing is not working correctly. You will first need to check the IP routing table on the router that connects the two locations.

31
New cards

You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?

A: VLAN assignment

Explanation: If a user can access everything but the resources, it means that the user has a working network, but his system could be placed in the wrong VLAN on the switch. You will need to first verify the VLAN assignment of the port to which the user's computer is connected.

32
New cards

You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?

A: Broadcast storm

Explanation: One of the common causes of packet loss is referred to as link congestion. Think of rush hour traffic when there are too many cars on the road, and no one can get anywhere or when a four-lane highway in a high-volume area merge down to two lanes. A very similar situation happens when more packets are arriving at a link than it was designed to handle.

33
New cards

You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?

A: Windows firewall is enabled, and port 8443 is not allowing traffic

Explanation: If you are experiencing issues with applications running on a specific port and everything else related to that server is working, it is usually caused by a firewall running on that server.

34
New cards

You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?

A: traceroute

Explanation: Traceroute is a very useful command to troubleshoot routing issues and verify the path between two connections. The traceroute command will give you the IP address of every host that the packets traverse across.