What key advantage does a virtual router have over a physical router?
Multiple networks can be connected to a single interface
How do switches and bridges learn where devices are located on a network?
When a frame enters a port, the source MAC address is copied from the frame header
A user from the sales department calls to report that he is experiencing problems
connecting to the sales file server. All users in the sales department connect to the
sales server through a single Ethernet switch. No other users have reported problems
connecting to the sales server.
Which of the following troubleshooting actions are you most likely to perform first?
Replace the network card in the user's computer
You have just downloaded a file. You create a hash of the file and compare it to the hash posted
on the website. The two hashes match. What do you know about the file?
Your copy is the same as the copy posted on the website
You just deployed a new Cisco router that connects several network segments in your
organization.
The router is physically located in a server room that requires an ID card for access.
You backed up the router configuration to a remote location in an encrypted file. You
access the router configuration interface from your notebook computer using a Telnet
client with the username admin and the password admin. You used the MD5 hashing
algorithm to protect the password.
What should you do to increase the security of this device? (Select two.)
Change the default administrative user name and password
Use an SSH client to access the router configuration
You have just connected four new computer systems to an Ethernet switch using spare
patch cables. After the installation, only three systems are able to access the network.
You verify all client network settings and replace the network card in the failed system.
The client is still unable to access the network.
Which of the following might you suspect is the real cause of the problem?
Failed patch cable
,Which of the following TCP/IP protocols do email clients use to download messages from a
remote mail server?
POP3
Match the virtualization feature on the right with the appropriate description on the left.
Flexibility
Moving virtual machines between hypervisor hosts.
Testing
Verifying that security controls are working as designed.
Server consolidation
Performing a physical-to-virtual migration (P2V).
Sandboxing
Isolating a virtual machine from the physical network.
Which IDS method searches for intrusion or attack attempts by recognizing patterns or
identities listed in a database?
Signature-Based
You manage a network that has multiple internal subnets. You connect a workstation to
the 192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not with
other hosts. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : mydomain.local
Description . . . . . . . : Broadcom network adapter
Physical Address. . . . . . : 00-AA-BB-CC-74-EF
DHCP Enabled . . . . . . . : No
Autoconfiguration Enabled. . . : Yes
IPv4 Address . . . . . . . : 192.168.1.102(Preferred)
Subnet Mask . . . . . . . : 255.255.255.0
, Default Gateway. . . . . . . . . : 192.168.2.1
DNS Servers. . . . . . . . . . . : 192.168.2.20
What is the most likely cause of the problem?
Incorrect default gateway
You want a switch to have the ability to modify the media type the switch port supports. Which
type of module might you use to make this possible?
SFP
GBIC
What is the primary goal of business continuity planning?
Maintaining business operations with reduced or restricted infrastructure capabilities or
resources
You are concerned about attacks directed at the firewall on your network. You would
like to examine the content of individual frames sent to the firewall.
Which tool should you use?
Packet sniffer
Match each type of access point on the left with the wireless network architecture where
it is commonly used on the right. Each type of access point may be used once, more
than once, or not at all.
Independent access point infrastructure
Intelligent AP
Hub-and-spoke infrastructure
Lightweight AP
Distributed wireless mesh infrastructure
Intelligent AP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller kiarienaomi88. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.