100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Network Pro Exam Questions with Correct Answers $13.89   Add to cart

Exam (elaborations)

Network Pro Exam Questions with Correct Answers

 7 views  0 purchase
  • Course
  • Network Pro
  • Institution
  • Network Pro

Network Pro Exam Questions with Correct Answers Which of the following scenarios would cause a problem in asymmetric routing? - Answer-Using two stateful firewalls in the traffic flow. You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast stor...

[Show more]

Preview 3 out of 19  pages

  • August 10, 2024
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Network Pro
  • Network Pro
avatar-seller
Scholarsstudyguide
Network Pro Exam Questions with
Correct Answers
Which of the following scenarios would cause a problem in asymmetric routing? -
Answer-Using two stateful firewalls in the traffic flow.

You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms? - Answer-
You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms?

Which of the following can cause broadcast storms? - Answer-Switching loops

You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.
What should you use for this situation? - Answer-VLAN

Which of the following BEST defines a SAN? - Answer-A block-level storage network

You manage a network with three dedicated storage devices, as shown in the diagram.
Users on the network see only a single file server.
Which network-based storage technology is being used? - Answer-NAS with clustering

Which of the following are the components of a SAN? - Answer-Hosts, storage, and
SAN fabric

Brett has been tasked with creating a new SAN. The company currently has Gigabit
internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN.
Brett tells the CTO that this will not work. Which of the following BEST describes the
problem? - Answer-Fibre Channel over Ethernet requires 10 Gigabit internet.

What BEST describes the designed purpose of InfiniBand? - Answer-High-performance
supercomputers

You are in the process of configuring an iSCSI storage area network (SAN) for your
network.

,You want to configure a Windows Server system to connect to an iSCSI target defined
on a different server system. You also need to define iSCSI security settings, including
CHAP and IPsec.
Which tool should you use? - Answer-iSCSI Initiator

Within an SDN, what is commonly referred to as the brains? - Answer-Controllers

Which option BEST describes the third layer in the SDN architecture? - Answer-
Infrastructure

What are the three layers of an SDN? - Answer-Application, Control, and Infrastructure

Which of the following BEST describes the main purpose of the codec used in VoIP? -
Answer-An algorithm to compress data in order to save on bandwidth.

Which of the following BEST describes VoIP (Voice over Internet Protocol)? - Answer-A
protocol optimized for voice data transmission (telephone calls) through a packet-
switched IP network.

Which of the following are considered VoIP endpoints? - Answer-Hard phones and soft
phones

Larry is tasked with implementing a VoIP system in the office. He presents his research
to his boss, who wants to use the current traditional hard phones to save money. What
BEST explains why this is not possible? - Answer-A traditional hard phone does not
have the internal computing parts to accept VoIP transmissions.

Five salespeople work out of your office. They frequently leave their laptops on the
desks in their cubicles. You are concerned that someone might walk by and take one of
these laptops.
Which of the following is the BEST way to address your concerns? - Answer-Use cable
locks to chain the laptops to the desks.

What is the primary benefit of CCTV? - Answer-Expands the area visible to security
guards.

Which of the following CCTV types would you use in areas with little or no light? -
Answer-Infrared

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer-Security guards

Which of the following is the MOST important way to prevent console access to a
network switch? - Answer-Keep the switch in a room that is locked by a keypad.

, Which of the following controls is an example of a physical access control method? -
Answer-Locks on Doors

Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry? - Answer-Deploy a
mantrap.

Which of the following is a secure doorway that can be used with a mantrap to allow an
easy exit but actively prevents re-entrance through the exit portal? - Answer-Turnstiles

Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses? -
Answer-DNS poisoning

Which of the following is an attack that either exploits a software flaw or floods a system
with traffic in order to prevent legitimate activities or transactions from occurring? -
Answer-Denial-of-service attack

You are using a password attack that tests every possible keystroke for each single key
in a password until the correct one is found. Which of the following technical password
attacks are you using? - Answer-Brute force attack

Which of the following is a text file that a website stores on a client's hard drive to track
and record information about the user? - Answer-Cookie

Which of the following is the open standard for tagging Layer 2 frames? - Answer-
802.1q

Which of the following protocols prescribes what to do when a data channel is in use on
a half-duplex device? - Answer-CSMA/CD

A switch receives a frame with a destination MAC address that is not found in its MAC
address table. What happens next? - Answer-The frame is replicated and sent to every
active port on the switch except the source port.

Which of the following is the protocol used for address resolution when you switch from
IPv4 to IPv6? - Answer-Which of the following is the protocol used for address
resolution when you switch from IPv4 to IPv6?

In which type of device is a MAC address table stored? - Answer-Switch

You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.89. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.89
  • (0)
  Add to cart