Looks like no one added any tags here yet for you.
Which tier in the three-tiered network is responsible for routing traffic in and out of a network?
Core
At which layer in Software Defined Network (SDN) will you find a firewall?
Application layer
How many tiers are there in the spine and leaf network architecture?
2
The traffic that enters into a network is known as the ___________ traffic.
Southbound
Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?
Internet Small Computer Systems Interface (iSCSI)
When configuring a vNIC to obtain IP addressing from its host, which choice is used?
Nat mode
When configuring a vNIC, which choice is used to allow VMs on the same host to communicate but NOT with other network nodes?
Host-Only mode
When configuring a vNIC to access a physical network using the host machine's NIC, which choice is used?
Bridged
A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file, web and database servers be best managed?
Both
Merging physical and virtual network architecture is known by what acronym?
NFV
Which choice is a good reason to segment a network?
geography.
departments.
device types.
all of the above.
All of the above
Network segments that are more accessible to the internet are known by what new term?
DIZ
Screened Subnet
Enhanced Subnet
None of these
Screened Subnet
An IPv4 address is presented in the dotted quad format consisting of four decimal values, separated by dots. What is the highest decimal value assignable to one of the quads?
102
284
155
255
255
To Improve performance and relieve congestion, you are going to create specialized subnets for high volume segments. Which class C subnet mask would you use?
/28
/29
/30
/32
/29
How would the decimal number 4 be represented as a binary value? Enter your answer in the space provided.
100
How many ports does your switch have?
28 ports
What is your switch's current firmware version?
1.0.1.4
How many VLANs are currently configured on the switch?
10
Which one is the default VLAN?
1
Which tier in the three-tiered network is responsible for routing traffic in and out of a network?
Core
At which layer in Software Defined Network (SDN) will you find a firewall?
Application layer
How many tiers are there in the spine and leaf network architecture?
2
The traffic that enters into a network is known as the ___________ traffic.
Southbound
Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?
Internet Small Computer Systems Interface (iSCSI)
You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?
A: DHCP Snooping
You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?
A: Create Private VLANs
You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?
A: Move the ports from the default VLAN to a new, unused VLAN and then disable them
Which of the following versions of SNMP are considered unsecure? [Choose all that apply]
A: SNMPv2c
SNMPv1
You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?
A: Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
A: Check the IP routing table
Explanation: If you are unable to ping host B, located in a different location from host A, it means that the routing is not working correctly. You will first need to check the IP routing table on the router that connects the two locations.
You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?
A: VLAN assignment
Explanation: If a user can access everything but the resources, it means that the user has a working network, but his system could be placed in the wrong VLAN on the switch. You will need to first verify the VLAN assignment of the port to which the user's computer is connected.
You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?
A: Broadcast storm
Explanation: One of the common causes of packet loss is referred to as link congestion. Think of rush hour traffic when there are too many cars on the road, and no one can get anywhere or when a four-lane highway in a high-volume area merge down to two lanes. A very similar situation happens when more packets are arriving at a link than it was designed to handle.
You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?
A: Windows firewall is enabled, and port 8443 is not allowing traffic
Explanation: If you are experiencing issues with applications running on a specific port and everything else related to that server is working, it is usually caused by a firewall running on that server.
You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?
A: traceroute
Explanation: Traceroute is a very useful command to troubleshoot routing issues and verify the path between two connections. The traceroute command will give you the IP address of every host that the packets traverse across.