A logical network design focuses on specific technologies and products needed to create a network.
Question 1 answers
True
False
Question 2 text Question 2 3.4 points Save
The distribution layer is the part of the network that connects the access layer to the rest of the network.
Question 2 answers
True
False
Question 3 text Question 3 3.4 points Save
For what purpose is an SNMP trap command used?
Question 3 answers
to detect unauthorized agents
to remotely disable a managed device
to set device configuration parameters
to have a device send a notification in case of a failure
Question 4 text Question 4 3.4 points Save
RAID 5 is an example of which of the following?
Question 4 answers
an automatic failover remote system
a fault-tolerant disk subsystem
a network monitoring device
a software distribution method
Question 5 text Question 5 3.4 points Save
Which type of backup is used to back up changed data only, with the archive bit being reset during the backup?
Question 5 answers
Daily
Normal
Incremental
Differential
Question 6 text Question 6 3.4 points Save
Which of the following could you use to capture network traffic for later analysis?
Question 6 answers
An SNMP management console
A network sniffer
Windows System Monitor
A remote control utility
Question 7 text Question 7 3.4 points Save
A high percentage of frames detected with garbled data and other errors is usually an indication of what?
Question 7 answers
An active Ethernet network
An inefficient network protocol
A failing network adapter
Unauthorized network access
Question 8 text Question 8 3.4 points Save
Which of the following is used to back up all data, whether or not the files have changed since the last backup?
Question 8 answers
Normal backup
Differential backup
Daily backup
Incremental backup
Question 9 text Question 9 3.4 points Save
How many hard disks are required for RAID 1?
Question 9 answers
1
2
3
4
Question 10 text Question 10 3.4 points Save
How many hard disks are required for RAID 5?
Question 10 answers
At least one
At least two
At least three
At least four
Question 11 text Question 11 3.4 points Save
RAID 5 is also known as which of the following?
Question 11 answers
Disk mirroring
Disk striping with parity
Disk swapping
Disk queuing
Question 12 text Question 12 3.4 points Save
You can define an alert to cause a computer to take which of the following actions?
Question 12 answers
Send a network message to a specific computer
Log an entry in the application event log
Start a performance log that you've already defined
All of the above
Question 13 text Question 13 3.4 points Save
What is the role of core layer network technology?
Question 13 answers
It provides the wide area links connecting distribution layer networks
It acts as the backbone in a routed LAN
It is a technology that directly provides users with access to LAN resources
It is the software and services that operate on servers running the NOS
Question 14 text Question 14 3.4 points Save
When connecting to your local ISP, you connect through which of the following?
Question 14 answers
MAE
NAP
POP
NSF
Question 15 text Question 15 3.4 points Save
Which server type would you most likely need to deploy at each physical location in a WAN?
Question 15 answers
Logon and authentication server
Mail service server
Web server
Mainframe gateway server
Question 16 text Question 16 3.4 points Save
Which of the following does TCP use to find a computer's MAC address when its IP address is known?
Question 16 answers
IP
ARP
RARP
DHCP
Question 17 text Question 17 3.4 points Save
Which of the following would you find in a typical RFP?
Question 17 answers
Security and control requirements
Bid evaluation criteria
Reliability and performance guarantee requirements
All of the above
Question 18 text Question 18 3.4 points Save
Which of the following is the maximum upstream rate for OC-1?
Question 18 answers
1.6Mbps
2.3Mbps
13Mbps
16Mbps
Question 19 text Question 19 3.4 points Save
How many separate channels does ADSL create over one local loop circuit?
Question 19 answers
1
2
3
4
Question 20 text Question 20 3.4 points Save
A Trojan horse is a program that appears to be one thing but is actually another.
Question 20 answers
True
False
Question 21 text Question 21 3.4 points Save
Unauthorized access is most often the result of an incursion by an individual from outside an organization.
Question 21 answers
True
False
Question 22 text Question 22 3.4 points Save
Which of the following is an example of a strong password?
Question 22 answers
Dictionary
Bluegreen2
cu&tin=bronze
ahtraM
Question 23 text Question 23 3.4 points Save
Which of the following could be used to detect someone trying to guess a user's password?
Question 23 answers
Account lockout
Password history
Password age
Reversible password encryption
Question 24 text Question 24 3.4 points Save
Which of the following refers to a network segment isolated for security reasons?
Question 24 answers
WPA
DES
TKIP
DMZ
Question 25 text Question 25 3.4 points Save
Which of the following is a malicious application designed to monitor and record a user's activity on a computer?
Question 25 answers
Spyware
Rootkit
Worm
Signature
Question 26 text Question 26 3.4 points Save
Ping of death is an example of which of the following?
Question 26 answers
Malware
WinNuke attack
DoS attack
SYN flood
Question 27 text Question 27 3.4 points Save
Which of the following might an attacker employ to make a DDoS attack difficult to detect or block?
Question 27 answers
IP spoofing
Dynamic filtering
WinNuke
A DES algorithm
Question 28 text Question 28 3.4 points Save
You want to limit traffic into and out of your network to ports 80 and 443. What type of device should you deploy?
Question 28 answers
Firewall
NAT server
Switch
Bridge
Question 29 text Question 29 3.4 points Save
Which of the following events affects the highest percentage of organizations each year?
Question 29 answers
Device failure
Virus
Theft of equipment
Fraud
Question 30 text Question 30 3.4 points Save
What is circuit loading?
Question 30 answers
The process of testing a circuit to determine its maximum capacity
The process of estimating network circuit requirements
A reference to the amount of data carried on a circuit
A reference to buying and installing more capacity than it actually needed