For Assistance with other modules
Whatsapp +27682021794
www.myassignments.co.za
COS2626
EXAM PACK
2017-2022
,OCT_NOV_2022_COS2626
Question 1
It is a protocol used for accessing network-based LDAP directories.
Routers rate the ___________ and ___________ of a routing protocol's data based on the
criterion of AD (Administrative Distance), convergence time and overhead.
a. throughput; latency
b. availability; support
c. hop count; load
d. reliability; priority
Question 2
Which of the following are NOT valid MAC (Media Access Control) addresses?
Select one or more:
a. ::9F53
b. D0:00:00:00
c. C3:00:50:00:FF:FF
d. FE80::32:1CA3:B0E2
e. 153.101.24.3
Question 3
Jeff Green has been hired as a systems analyst by an online retail company. The company
is expecting a huge network traffic triggered by the Christmas sale, which will begin from
the midnight of December 23. There is an urgent need to adopt a congestion control
technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop
congestion control technique to prevent this congestion before it occurs. Which one of the
following techniques should Jeff ideally choose to ensure that important traffic can survive
the congestion while less sensitive frames are discarded?
a. Admission policy
b. Discarding policy
c. Acknowledgement policy
d. Window policy
Question 4
From the list below, HOW MANY are examples of routing metrics used to determine the
best path?
a. 9
b. 8
c. 6
d. 7
,Question 5
Which of the following statements regarding SANs (Storage Area Networks) are TRUE?
Select one or more:
a. SANs use one of these technologies: Fibre Channel (FC), FCoE (Fibre Channel over
Ethernet), iSCSI (Internet SCSI) or IB (InfiniBand).
b. A SAN abstracts storage services from computer services, and then provides high-
speed network services to connect them.
c. SANs are highly scalable and have a very high fault tolerance, massive storage
capabilities and fast data access.
d. A SAN cannot be installed in a location separate from the LAN (Local Area Network) it
serves.
Question 6
Which statements regarding MPLS (Multiprotocol Label Switching) are TRUE?
Select one or more:
a. One of the benefits of MPLS is that MPLS connections are highly scalable.
b. Collectively, the MPLS labels are sometimes called a fragment because of their
placement between Layer 3 and Layer 2 information.
c. MPLS enables multiple types of Layer 3 protocols to travel over any one of several
connection-oriented Layer 2 protocols.
d. MPLS offers potentially faster transmission than traditionally routed networks.
Question 7
You are creating a new Linux server as a virtual machine on your Windows 8.1 workstation.
Which one of the following commands will display TCP/IP (Transmission Control
Protocol/Internet Protocol) information associated with every interface on a Linux device?
a. ipconfig –a at the Linux server’s shell prompt
b. ifconfig –a at the Linux server’s shell prompt
c. ipconfig /all at the Windows command prompt
d. ethtool –a at the Linux server’s shell prompt
e. ip addr at the Windows command prompt
Question 8
James, a supporting technician, is trying to resolve an issue pertaining to the router. On
inspecting the issue, he figured that the router was unable to move packages from one node
to another. As a resolution to this problem, he intends to follow the OSI (Open Systems
Interconnection) model for troubleshooting. What layer of the OSI model should he inspect
to understand the issue relating to the router?
a. The physical layer
b. The network layer
c. The transport layer
d. The session layer
, Question 9
Identify the standard from the following list of CHARACTERISTICS.
a. 802.3af
b. 802.9de
c. 802.7bc
d. 802.5bf
Question 10
When a hacker attempts to perform a VLAN (Virtual Local Area Network) hopping attack,
which TWO approaches are likely to be used?
Select one or more:
a. DNS (Domain Name System) spoofing
b. double tagging
c. tagging
d. switch spoofing
Question 11
Which scanning tool was used to detect a SOHO router's administrative username and
password as depicted in the following diagram?
a. Nmap
b. Nessus
c. Metasploit
Question 12
Which one of the following is NOT a step every IT technician should take to safeguard
sensitive information, logged data and other legal evidence until the incident response
team can take over the collection of evidence?
a. Secure the area and disconnect devices from the network
b. Create documentation detailing the scene
c. Protect the chain of custody of evidence
d. Access files on a computer being collected for evidence
Question 13
In the context of terminal emulation, which one of the following statements regarding VNC
(Virtual Network Computing or Virtual Network Connection) is CORRECT?
a. VNC is open source, allowing companies to develop their own software.
b. VNC is faster than Remote Desktop and requires less network bandwidth.
c. VNC uses the Remote Desktop Protocol (RDP).
d. VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MyAssignments. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.13. You're not tied to anything after your purchase.