100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Network Pro Exam Questions with Correct Answers €13,07   In winkelwagen

Tentamen (uitwerkingen)

Network Pro Exam Questions with Correct Answers

 5 keer bekeken  0 keer verkocht
  • Vak
  • Network Pro
  • Instelling
  • Network Pro

Network Pro Exam Questions with Correct Answers Which of the following scenarios would cause a problem in asymmetric routing? - Answer-Using two stateful firewalls in the traffic flow. You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast stor...

[Meer zien]

Voorbeeld 3 van de 19  pagina's

  • 10 augustus 2024
  • 19
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • Network Pro
  • Network Pro
avatar-seller
Network Pro Exam Questions with
Correct Answers
Which of the following scenarios would cause a problem in asymmetric routing? -
Answer-Using two stateful firewalls in the traffic flow.

You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms? - Answer-
You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms?

Which of the following can cause broadcast storms? - Answer-Switching loops

You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.
What should you use for this situation? - Answer-VLAN

Which of the following BEST defines a SAN? - Answer-A block-level storage network

You manage a network with three dedicated storage devices, as shown in the diagram.
Users on the network see only a single file server.
Which network-based storage technology is being used? - Answer-NAS with clustering

Which of the following are the components of a SAN? - Answer-Hosts, storage, and
SAN fabric

Brett has been tasked with creating a new SAN. The company currently has Gigabit
internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN.
Brett tells the CTO that this will not work. Which of the following BEST describes the
problem? - Answer-Fibre Channel over Ethernet requires 10 Gigabit internet.

What BEST describes the designed purpose of InfiniBand? - Answer-High-performance
supercomputers

You are in the process of configuring an iSCSI storage area network (SAN) for your
network.

,You want to configure a Windows Server system to connect to an iSCSI target defined
on a different server system. You also need to define iSCSI security settings, including
CHAP and IPsec.
Which tool should you use? - Answer-iSCSI Initiator

Within an SDN, what is commonly referred to as the brains? - Answer-Controllers

Which option BEST describes the third layer in the SDN architecture? - Answer-
Infrastructure

What are the three layers of an SDN? - Answer-Application, Control, and Infrastructure

Which of the following BEST describes the main purpose of the codec used in VoIP? -
Answer-An algorithm to compress data in order to save on bandwidth.

Which of the following BEST describes VoIP (Voice over Internet Protocol)? - Answer-A
protocol optimized for voice data transmission (telephone calls) through a packet-
switched IP network.

Which of the following are considered VoIP endpoints? - Answer-Hard phones and soft
phones

Larry is tasked with implementing a VoIP system in the office. He presents his research
to his boss, who wants to use the current traditional hard phones to save money. What
BEST explains why this is not possible? - Answer-A traditional hard phone does not
have the internal computing parts to accept VoIP transmissions.

Five salespeople work out of your office. They frequently leave their laptops on the
desks in their cubicles. You are concerned that someone might walk by and take one of
these laptops.
Which of the following is the BEST way to address your concerns? - Answer-Use cable
locks to chain the laptops to the desks.

What is the primary benefit of CCTV? - Answer-Expands the area visible to security
guards.

Which of the following CCTV types would you use in areas with little or no light? -
Answer-Infrared

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer-Security guards

Which of the following is the MOST important way to prevent console access to a
network switch? - Answer-Keep the switch in a room that is locked by a keypad.

, Which of the following controls is an example of a physical access control method? -
Answer-Locks on Doors

Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry? - Answer-Deploy a
mantrap.

Which of the following is a secure doorway that can be used with a mantrap to allow an
easy exit but actively prevents re-entrance through the exit portal? - Answer-Turnstiles

Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses? -
Answer-DNS poisoning

Which of the following is an attack that either exploits a software flaw or floods a system
with traffic in order to prevent legitimate activities or transactions from occurring? -
Answer-Denial-of-service attack

You are using a password attack that tests every possible keystroke for each single key
in a password until the correct one is found. Which of the following technical password
attacks are you using? - Answer-Brute force attack

Which of the following is a text file that a website stores on a client's hard drive to track
and record information about the user? - Answer-Cookie

Which of the following is the open standard for tagging Layer 2 frames? - Answer-
802.1q

Which of the following protocols prescribes what to do when a data channel is in use on
a half-duplex device? - Answer-CSMA/CD

A switch receives a frame with a destination MAC address that is not found in its MAC
address table. What happens next? - Answer-The frame is replicated and sent to every
active port on the switch except the source port.

Which of the following is the protocol used for address resolution when you switch from
IPv4 to IPv6? - Answer-Which of the following is the protocol used for address
resolution when you switch from IPv4 to IPv6?

In which type of device is a MAC address table stored? - Answer-Switch

You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €13,07. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 78462 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€13,07
  • (0)
  Kopen