A logical network design focuses on specific technologies and products needed to create a network. Question 1 answers True False Question 2 text Question 2 3.4 points Save The distribution layer is the part of the network that connects the access layer to the rest of the network. Question 2 answers True False Question 3 text Question 3 3.4 points Save For what purpose is an SNMP trap command used? Question 3 answers to detect unauthorized agents to remotely disable a managed device to set device configuration parameters to have a device send a notification in case of a failure Question 4 text Question 4 3.4 points Save RAID 5 is an example of which of the following? Question 4 answers an automatic failover remote system a fault-tolerant disk subsystem a network monitoring device a software distribution method Question 5 text Question 5 3.4 points Save Which type of backup is used to back up changed data only, with the archive bit being reset during the backup? Question 5 answers Daily Normal Incremental Differential Question 6 text Question 6 3.4 points Save Which of the following could you use to capture network traffic for later analysis? Question 6 answers An SNMP management console A network sniffer Windows System Monitor A remote control utility Question 7 text Question 7 3.4 points Save A high percentage of frames detected with garbled data and other errors is usually an indication of what? Question 7 answers An active Ethernet network An inefficient network protocol A failing network adapter Unauthorized network access Question 8 text Question 8 3.4 points Save Which of the following is used to back up all data, whether or not the files have changed since the last backup? Question 8 answers Normal backup Differential backup Daily backup Incremental backup Question 9 text Question 9 3.4 points Save How many hard disks are required for RAID 1? Question 9 answers 1 2 3 4 Question 10 text Question 10 3.4 points Save How many hard disks are required for RAID 5? Question 10 answers At least one At least two At least three At least four Question 11 text Question 11 3.4 points Save RAID 5 is also known as which of the following? Question 11 answers Disk mirroring Disk striping with parity Disk swapping Disk queuing Question 12 text Question 12 3.4 points Save You can define an alert to cause a computer to take which of the following actions? Question 12 answers Send a network message to a specific computer Log an entry in the application event log Start a performance log that you've already defined All of the above Question 13 text Question 13 3.4 points Save What is the role of core layer network technology? Question 13 answers It provides the wide area links connecting distribution layer networks It acts as the backbone in a routed LAN It is a technology that directly provides users with access to LAN resources It is the software and services that operate on servers running the NOS Question 14 text Question 14 3.4 points Save When connecting to your local ISP, you connect through which of the following? Question 14 answers MAE NAP POP NSF Question 15 text Question 15 3.4 points Save Which server type would you most likely need to deploy at each physical location in a WAN? Question 15 answers Logon and authentication server Mail service server Web server Mainframe gateway server Question 16 text Question 16 3.4 points Save Which of the following does TCP use to find a computer's MAC address when its IP address is known? Question 16 answers IP ARP RARP DHCP Question 17 text Question 17 3.4 points Save Which of the following would you find in a typical RFP? Question 17 answers Security and control requirements Bid evaluation criteria Reliability and performance guarantee requirements All of the above Question 18 text Question 18 3.4 points Save Which of the following is the maximum upstream rate for OC-1? Question 18 answers 1.6Mbps 2.3Mbps 13Mbps 16Mbps Question 19 text Question 19 3.4 points Save How many separate channels does ADSL create over one local loop circuit? Question 19 answers 1 2 3 4 Question 20 text Question 20 3.4 points Save A Trojan horse is a program that appears to be one thing but is actually another. Question 20 answers True False Question 21 text Question 21 3.4 points Save Unauthorized access is most often the result of an incursion by an individual from outside an organization. Question 21 answers True False Question 22 text Question 22 3.4 points Save Which of the following is an example of a strong password? Question 22 answers Dictionary Bluegreen2 cu&tin=bronze ahtraM Question 23 text Question 23 3.4 points Save Which of the following could be used to detect someone trying to guess a user's password? Question 23 answers Account lockout Password history Password age Reversible password encryption Question 24 text Question 24 3.4 points Save Which of the following refers to a network segment isolated for security reasons? Question 24 answers WPA DES TKIP DMZ Question 25 text Question 25 3.4 points Save Which of the following is a malicious application designed to monitor and record a user's activity on a computer? Question 25 answers Spyware Rootkit Worm Signature Question 26 text Question 26 3.4 points Save Ping of death is an example of which of the following? Question 26 answers Malware WinNuke attack DoS attack SYN flood Question 27 text Question 27 3.4 points Save Which of the following might an attacker employ to make a DDoS attack difficult to detect or block? Question 27 answers IP spoofing Dynamic filtering WinNuke A DES algorithm Question 28 text Question 28 3.4 points Save You want to limit traffic into and out of your network to ports 80 and 443. What type of device should you deploy? Question 28 answers Firewall NAT server Switch Bridge Question 29 text Question 29 3.4 points Save Which of the following events affects the highest percentage of organizations each year? Question 29 answers Device failure Virus Theft of equipment Fraud Question 30 text Question 30 3.4 points Save What is circuit loading? Question 30 answers The process of testing a circuit to determine its maximum capacity The process of estimating network circuit requirements A reference to the amount of data carried on a circuit A reference to buying and installing more capacity than it actually needed