IT Infrastructure TEST!!
Which of the following are the benefits of creating a VLAN?
Each correct answer represents a complete solution. Choose all that apply.
Which protocol uses Internet Control Message Protocol version 6 (ICMPv6) messages to discover details about the network?
B ARP
C IPSec
D IGMP
Which of the following statements are true with regards to 1000BASE-ZX Ethernet standard?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following uses DSSS?
A IEEE 802.11a
B IEEE 802.11b
C IEEE 802.11g
work as a network consultant at Tech Perfect Inc. You’re designing a network for the company and you need to ensure that the cabling must support
data transfer speeds up to 1000 Mbps. Also, the frequency range must be 600 MHz. Which of the following cables should you use?
A CAT 7
B CAT 6A
C CAT 6
D CAT 5E
You are using DSL to connect to the Internet. You recently installed a firewall software to protect your computer’s resources from unauthorized access. But
after setting up the firewall software, you can no longer access Web sites by name. What is the problem?
A You do not have a static IP address.
B Your firewall software is blocking port 53.
C Your firewall software is blocking port 25.
D You have a DHCP server on the network.
What number of maximum ports do most form factor switches have?
What is the CIDR notation of the IP address 124.70.12.16?
A 124.70.12.16 /8
B 124.70.12.16 /24
C 124.70.12.16/16
D 124.70.12.16/26
Which of the following network access security methods involves the analysis of a physical hardware address?
A RAS
B 1 2TP
C IP filtering
D MAC address filtering
Which of the following is used to provide central authentication and logging?
A IPSec
B Secure Sockets Layer
C RADIUS server
D Generic Routing Encapsulation
You work as a network administrator at Certify Inc. You administer a TCP/IP network that is not subnetted. One of the network hosts has the IP
address 128.250.0.10. What is the network ID of the network you administer?
A 128.250.255.255
B 255.255.255.255
C 128.250.0.0
D 128.0.0.0
Which of the following statements are true about Quality of Service (QoS)?
Each correct answer represents a complete solution. Choose all that apply.
A QoS technologies help to identify which traffic types should be dropped first if congestion occurs.
B There is rigidity in applying QoS policies for all users based on how or from where they connect to a network.
C QoS allows to strategically optimize a network’s performance for selected traffic types.
D With the use of QoS technologies, one can identify which type of traffic needs to be sent first.
E QoS technologies help to identify how much bandwidth should be allocated to different traffic types.
Which of the following statements are true about IPv6?
Each correct answer represents a complete solution. Choose all that apply.
A It uses 28 bits and can address about 4 billion addresses.
B Two sets of double colons are not valid in an IPv6 address.
C IPv6 addresses are displayed as hexadecimal characters.
D It provides improved authentication and security,
Which command is used to remove DNS resolved entries from the host cache?
What is the speed of digital subscriber line (DSL) connection?
B Up to 24 Mbps
C Up to 30 Mbps
D @50 Kbps
You work as a network administrator at Certify Inc. You want to implement a mechanism that automatically assigns IP addresses including the subnet
mask, the address of the default gateway, the address of a DNS server, and the domain name. Which protocol would you use to accomplish the task?
Which of the following are the functions of routing protocols?
Each correct answer represents a complete solution. Choose two.
You want to provide shared access to files, printers, and serial ports between nodes on a network. Which of the following protocols should you use?
B SNMP
C SMTP
D SMB
You work as a network administrator at Tech Perfect Inc. The company’s network is based on TCP/IP. You need to diagnose TCP/IP configuration and
network connection problem to troubleshoot a network issue. Which of the following two utilities could you use to accomplish the task?
Which of the following standard organizations focuses on information and communication technology issues?
A IETF
B TITU
C IEEE
D W3C
A layer 2 switch has the primary purpose of segmenting collision domains at which layer of the OSI model?
A Data Link
B Application
C Transport
D Network
What provides continuous power to a system even if a power sag occurs or if power is lost for a short period?
A Generator
B Surge protector
C UPS
D Power Filter
This question requires that you evaluate the underlined text to determine if it is correct.
“Windows Internet Name Service” refers to a legacy computer name registration and resolution service, which maps computer NetBIOS names to IP
addresses.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’ if the underlined text makes the
statement correct.
A Domain Naming System
B No change is needed
C Address Resolution Protocol
D Internet Service Provider
Which of the following layers in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A Application
B Network Access
C Internet
D Host-to-Host
Which of the following network devices creates both separate collision domains and separate broadcast domains?
A Router
B Bridge
C Switch
D Hub
Which of the following statements are true about a workgroup?
Each correct answer represents a complete solution. Choose all that apply.
A It is usually designed for SOHOs including one to ten workers.
B All computers must be on the same local network.
C It provides single sign-on (SSO) capabilities.
What refers to an area between the Internet and an intranet that hosts resources for trusted entities?
A Internet
B Extranet
C Intranet
D Perimeter network
You work as a network designer at Certify Inc. The company’s network is based on TCP/IP. You are designing a network for a new branch of the
company. You need to divide the network into three subnets. Which of the following devices should you use?
A Hub
B repeater
C Router
D Modem
Which of the following describes a network that separates an organization’s private network from a public network?
A Perimeter
B Extranet
C Firewall
D Internet
Which command produces the following output?
Interface: 192.168.1.2 –0x3 Internet Address Physical Address
Type 790.168.1.1 00-16-57-69-2f-10 dynamic 192.168.1.255 ff-ff-ff-ff-ff-ffstatic 224.0.0.2 01-00-5e-00-00-02
static 224.0.0.22 01-00-5e-00-00-16 static 224.0.0.251 01-00-5e-00-00-fb
static 224.0.0.252 01-00-5e-00-00-fc
static 239.255.255.250
01-00-5e-7f-ff-fa
static 255.255.255.255
ff-ff-ff-ff-ff-ff static
A netstat
B nbtstat
C tracert
D arp-a
Which protocol uses broadcast transmissions to identify the Media Access Control (MAC) address of computers?
A FTP
B HTTP
C ARP
D RDS
This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is TCP/IP” enabled, which is an industry standard suite of protocols designed for large networks consisting of network segments
connected by routers. It is the core protocol suite used on the Internet.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’ if the underlined text makes the
statement correct.
A No change is needed
B HTTP
C FTP
D SNMP
You work as a network administrator at Certify Inc. You need to configure a Cisco router with a hybrid protocol. Which of the following protocols satisfies
the above requirement?
AN
A OSPF
B EIGRP
C BGP
D IS-IS
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more
Recent Comments