LVM Lab Final Review

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 33

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

34 Terms

1

Which tier in the three-tiered network is responsible for routing traffic in and out of a network?

Core

New cards
2

At which layer in Software Defined Network (SDN) will you find a firewall?

Application layer

New cards
3

How many tiers are there in the spine and leaf network architecture?

2

New cards
4

The traffic that enters into a network is known as the ___________ traffic.

Southbound

New cards
5

Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?

Internet Small Computer Systems Interface (iSCSI)

New cards
6

When configuring a vNIC to obtain IP addressing from its host, which choice is used?

Nat mode

New cards
7

When configuring a vNIC, which choice is used to allow VMs on the same host to communicate but NOT with other network nodes?

Host-Only mode

New cards
8

When configuring a vNIC to access a physical network using the host machine's NIC, which choice is used?

Bridged

New cards
9

A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file, web and database servers be best managed?

Both

New cards
10

Merging physical and virtual network architecture is known by what acronym?

NFV

New cards
11

Which choice is a good reason to segment a network?
geography.
departments.
device types.
all of the above.

All of the above

New cards
12

Network segments that are more accessible to the internet are known by what new term?
DIZ
Screened Subnet
Enhanced Subnet
None of these

Screened Subnet

New cards
13

An IPv4 address is presented in the dotted quad format consisting of four decimal values, separated by dots. What is the highest decimal value assignable to one of the quads?
102
284
155
255

255

New cards
14

To Improve performance and relieve congestion, you are going to create specialized subnets for high volume segments. Which class C subnet mask would you use?
/28
/29
/30
/32

/29

New cards
15

How would the decimal number 4 be represented as a binary value? Enter your answer in the space provided.

100

New cards
16

How many ports does your switch have?

28 ports

New cards
17

What is your switch's current firmware version?

1.0.1.4

New cards
18

How many VLANs are currently configured on the switch?

10

New cards
19

Which one is the default VLAN?

1

New cards
20

Which tier in the three-tiered network is responsible for routing traffic in and out of a network?

Core

New cards
21

At which layer in Software Defined Network (SDN) will you find a firewall?

Application layer

New cards
22

How many tiers are there in the spine and leaf network architecture?

2

New cards
23

The traffic that enters into a network is known as the ___________ traffic.

Southbound

New cards
24

Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?

Internet Small Computer Systems Interface (iSCSI)

New cards
25

You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?

A: DHCP Snooping

New cards
26

You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?

A: Create Private VLANs

New cards
27

You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?

A: Move the ports from the default VLAN to a new, unused VLAN and then disable them

New cards
28

Which of the following versions of SNMP are considered unsecure? [Choose all that apply]

A: SNMPv2c
SNMPv1

New cards
29

You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?

A: Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement

New cards
30

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?

A: Check the IP routing table

Explanation: If you are unable to ping host B, located in a different location from host A, it means that the routing is not working correctly. You will first need to check the IP routing table on the router that connects the two locations.

New cards
31

You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?

A: VLAN assignment

Explanation: If a user can access everything but the resources, it means that the user has a working network, but his system could be placed in the wrong VLAN on the switch. You will need to first verify the VLAN assignment of the port to which the user's computer is connected.

New cards
32

You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?

A: Broadcast storm

Explanation: One of the common causes of packet loss is referred to as link congestion. Think of rush hour traffic when there are too many cars on the road, and no one can get anywhere or when a four-lane highway in a high-volume area merge down to two lanes. A very similar situation happens when more packets are arriving at a link than it was designed to handle.

New cards
33

You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?

A: Windows firewall is enabled, and port 8443 is not allowing traffic

Explanation: If you are experiencing issues with applications running on a specific port and everything else related to that server is working, it is usually caused by a firewall running on that server.

New cards
34

You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?

A: traceroute

Explanation: Traceroute is a very useful command to troubleshoot routing issues and verify the path between two connections. The traceroute command will give you the IP address of every host that the packets traverse across.

New cards

Explore top notes

note Note
studied byStudied by 18 people
645 days ago
5.0(1)
note Note
studied byStudied by 121 people
893 days ago
4.5(2)
note Note
studied byStudied by 107 people
35 days ago
5.0(1)
note Note
studied byStudied by 7 people
686 days ago
5.0(1)
note Note
studied byStudied by 46 people
292 days ago
5.0(2)
note Note
studied byStudied by 11 people
888 days ago
5.0(1)
note Note
studied byStudied by 11 people
685 days ago
5.0(1)
note Note
studied byStudied by 2859 people
686 days ago
4.4(15)

Explore top flashcards

flashcards Flashcard (40)
studied byStudied by 10 people
661 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 25 people
540 days ago
5.0(2)
flashcards Flashcard (72)
studied byStudied by 2 people
541 days ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 25 people
372 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 44 people
410 days ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 1 person
825 days ago
5.0(1)
flashcards Flashcard (181)
studied byStudied by 5 people
701 days ago
5.0(1)
flashcards Flashcard (112)
studied byStudied by 9 people
1 day ago
5.0(1)
robot