100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Network Pro Exam Questions with Correct Answers

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
10-08-2024
Written in
2024/2025

Network Pro Exam Questions with Correct Answers Which of the following scenarios would cause a problem in asymmetric routing? - Answer-Using two stateful firewalls in the traffic flow. You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of these broadcast storms? - Answer-You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of these broadcast storms? Which of the following can cause broadcast storms? - Answer-Switching loops You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? - Answer-VLAN Which of the following BEST defines a SAN? - Answer-A block-level storage network You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used? - Answer-NAS with clustering Which of the following are the components of a SAN? - Answer-Hosts, storage, and SAN fabric

Show more Read less
Institution
Network Pro
Course
Network Pro

Content preview

Network Pro Exam Questions with
Correct Answers
Which of the following scenarios would cause a problem in asymmetric routing? -
Answer-Using two stateful firewalls in the traffic flow.

You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms? - Answer-
You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms?

Which of the following can cause broadcast storms? - Answer-Switching loops

You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.
What should you use for this situation? - Answer-VLAN

Which of the following BEST defines a SAN? - Answer-A block-level storage network

You manage a network with three dedicated storage devices, as shown in the diagram.
Users on the network see only a single file server.
Which network-based storage technology is being used? - Answer-NAS with clustering

Which of the following are the components of a SAN? - Answer-Hosts, storage, and
SAN fabric

Brett has been tasked with creating a new SAN. The company currently has Gigabit
internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN.
Brett tells the CTO that this will not work. Which of the following BEST describes the
problem? - Answer-Fibre Channel over Ethernet requires 10 Gigabit internet.

What BEST describes the designed purpose of InfiniBand? - Answer-High-performance
supercomputers

You are in the process of configuring an iSCSI storage area network (SAN) for your
network.

,You want to configure a Windows Server system to connect to an iSCSI target defined
on a different server system. You also need to define iSCSI security settings, including
CHAP and IPsec.
Which tool should you use? - Answer-iSCSI Initiator

Within an SDN, what is commonly referred to as the brains? - Answer-Controllers

Which option BEST describes the third layer in the SDN architecture? - Answer-
Infrastructure

What are the three layers of an SDN? - Answer-Application, Control, and Infrastructure

Which of the following BEST describes the main purpose of the codec used in VoIP? -
Answer-An algorithm to compress data in order to save on bandwidth.

Which of the following BEST describes VoIP (Voice over Internet Protocol)? - Answer-A
protocol optimized for voice data transmission (telephone calls) through a packet-
switched IP network.

Which of the following are considered VoIP endpoints? - Answer-Hard phones and soft
phones

Larry is tasked with implementing a VoIP system in the office. He presents his research
to his boss, who wants to use the current traditional hard phones to save money. What
BEST explains why this is not possible? - Answer-A traditional hard phone does not
have the internal computing parts to accept VoIP transmissions.

Five salespeople work out of your office. They frequently leave their laptops on the
desks in their cubicles. You are concerned that someone might walk by and take one of
these laptops.
Which of the following is the BEST way to address your concerns? - Answer-Use cable
locks to chain the laptops to the desks.

What is the primary benefit of CCTV? - Answer-Expands the area visible to security
guards.

Which of the following CCTV types would you use in areas with little or no light? -
Answer-Infrared

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer-Security guards

Which of the following is the MOST important way to prevent console access to a
network switch? - Answer-Keep the switch in a room that is locked by a keypad.

, Which of the following controls is an example of a physical access control method? -
Answer-Locks on Doors

Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry? - Answer-Deploy a
mantrap.

Which of the following is a secure doorway that can be used with a mantrap to allow an
easy exit but actively prevents re-entrance through the exit portal? - Answer-Turnstiles

Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses? -
Answer-DNS poisoning

Which of the following is an attack that either exploits a software flaw or floods a system
with traffic in order to prevent legitimate activities or transactions from occurring? -
Answer-Denial-of-service attack

You are using a password attack that tests every possible keystroke for each single key
in a password until the correct one is found. Which of the following technical password
attacks are you using? - Answer-Brute force attack

Which of the following is a text file that a website stores on a client's hard drive to track
and record information about the user? - Answer-Cookie

Which of the following is the open standard for tagging Layer 2 frames? - Answer-
802.1q

Which of the following protocols prescribes what to do when a data channel is in use on
a half-duplex device? - Answer-CSMA/CD

A switch receives a frame with a destination MAC address that is not found in its MAC
address table. What happens next? - Answer-The frame is replicated and sent to every
active port on the switch except the source port.

Which of the following is the protocol used for address resolution when you switch from
IPv4 to IPv6? - Answer-Which of the following is the protocol used for address
resolution when you switch from IPv4 to IPv6?

In which type of device is a MAC address table stored? - Answer-Switch

You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.

Written for

Institution
Network Pro
Course
Network Pro

Document information

Uploaded on
August 10, 2024
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

CA$20.26
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
Follow You need to be logged in order to follow users or courses
Sold
804
Member since
3 year
Number of followers
476
Documents
15649
Last sold
4 days ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

165 reviews

5
87
4
21
3
27
2
6
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions