Which of the following are the benefits of creating a VLAN?

IT Infrastructure TEST!!

 

 

Which of the following are the benefits of creating a VLAN?

Each correct answer represents a complete solution. Choose all that apply.

  1. Ability to group workstations or servers based on needs, not a physical location
  2. More efficient than a LAN at controlling latency, but less effective than a WAN
  3. Improved network performance for each separate broadcast domain
  4. Improved LAN security as broadcast traffic is limited to specific ports

 

 

Which protocol uses Internet Control Message Protocol version 6 (ICMPv6) messages to discover details about the network?

  1. ND

B ARP

C IPSec

D IGMP

 

Which of the following statements are true with regards to 1000BASE-ZX Ethernet standard?

Each correct answer represents a complete solution. Choose all that apply.

  1. It requires a multimode fiber optic cable.
  2. It has a distance limitation of upto 10 km.
  3. It has a distance limitation of upto 70 km.
  4. It requires a single-mode fiber optic cable.

 

Which of the following uses DSSS?

A IEEE 802.11a

B IEEE 802.11b

C IEEE 802.11g

  1. IEEE 802.11n

 

 

work as a network consultant at Tech Perfect Inc. You’re designing a network for the company and you need to ensure that the cabling must support

data transfer speeds up to 1000 Mbps. Also, the frequency range must be 600 MHz. Which of the following cables should you use?

 

A CAT 7

B CAT 6A

C CAT 6

D CAT 5E

 

You are using DSL to connect to the Internet. You recently installed a firewall software to protect your computer’s resources from unauthorized access. But

after setting up the firewall software, you can no longer access Web sites by name. What is the problem?

 

A You do not have a static IP address.

B Your firewall software is blocking port 53.

C Your firewall software is blocking port 25.

D You have a DHCP server on the network.

 

 

What number of maximum ports do most form factor switches have?

  1. 46
  2. 48
  3. 44
  4. 42

 

What is the CIDR notation of the IP address 124.70.12.16?

A 124.70.12.16 /8

B 124.70.12.16 /24

C 124.70.12.16/16

D 124.70.12.16/26

 

Which of the following network access security methods involves the analysis of a physical hardware address?

A RAS

B 1 2TP

C IP filtering

D MAC address filtering

 

Which of the following is used to provide central authentication and logging?

A IPSec

B Secure Sockets Layer

C RADIUS server

D Generic Routing Encapsulation

 

You work as a network administrator at Certify Inc. You administer a TCP/IP network that is not subnetted. One of the network hosts has the IP

address 128.250.0.10. What is the network ID of the network you administer?

 

A 128.250.255.255

B 255.255.255.255

C 128.250.0.0

D 128.0.0.0

 

Which of the following statements are true about Quality of Service (QoS)?

Each correct answer represents a complete solution. Choose all that apply.

A QoS technologies help to identify which traffic types should be dropped first if congestion occurs.

B There is rigidity in applying QoS policies for all users based on how or from where they connect to a network.

C QoS allows to strategically optimize a network’s performance for selected traffic types.

D With the use of QoS technologies, one can identify which type of traffic needs to be sent first.

E QoS technologies help to identify how much bandwidth should be allocated to different traffic types.

 

Which of the following statements are true about IPv6?

Each correct answer represents a complete solution. Choose all that apply.

 

A It uses 28 bits and can address about 4 billion addresses.

B Two sets of double colons are not valid in an IPv6 address.

C IPv6 addresses are displayed as hexadecimal characters.

D It provides improved authentication and security,

 

Which command is used to remove DNS resolved entries from the host cache?

  1. ipconfig/displaydns
  2. notstat-n
  3. notstat-c
  4. ipconfig/flushans

 

What is the speed of digital subscriber line (DSL) connection?

  1. Typically up to 10 Mbps

B Up to 24 Mbps

C Up to 30 Mbps

D @50 Kbps

 

 

You work as a network administrator at Certify Inc. You want to implement a mechanism that automatically assigns IP addresses including the subnet

mask, the address of the default gateway, the address of a DNS server, and the domain name. Which protocol would you use to accomplish the task?

  1. DHCP
  2. ARP
  3. SMTP
  4. SNMP

 

Which of the following are the functions of routing protocols?

Each correct answer represents a complete solution. Choose two.

  1. Keep track of the state of network connections
  2. Allow routers to communicate with each other and share routing information
  3. Filter packets based on IP addresses, ports, and some protocols
  4. Make dynamic decisions for where to send each network message

 

You want to provide shared access to files, printers, and serial ports between nodes on a network. Which of the following protocols should you use?

  1. IMAP

B SNMP

C SMTP

D SMB

 

You work as a network administrator at Tech Perfect Inc. The company’s network is based on TCP/IP. You need to diagnose TCP/IP configuration and

network connection problem to troubleshoot a network issue. Which of the following two utilities could you use to accomplish the task?

  1. ping
  2. tracert
  3. ipconfig
  4. netstat

 

 

Which of the following standard organizations focuses on information and communication technology issues?

A IETF

B TITU

C IEEE

D W3C

 

A layer 2 switch has the primary purpose of segmenting collision domains at which layer of the OSI model?

A Data Link

B Application

C Transport

D Network

 

What provides continuous power to a system even if a power sag occurs or if power is lost for a short period?

A Generator

B Surge protector

C UPS

D Power Filter

 

This question requires that you evaluate the underlined text to determine if it is correct.

“Windows Internet Name Service” refers to a legacy computer name registration and resolution service, which maps computer NetBIOS names to IP

addresses.

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’ if the underlined text makes the

statement correct.

 

A Domain Naming System

B No change is needed

C Address Resolution Protocol

D Internet Service Provider

 

Which of the following layers in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

A Application

B Network Access

C Internet

D Host-to-Host

 

Which of the following network devices creates both separate collision domains and separate broadcast domains?

A Router

B Bridge

C Switch

D Hub

 

 

Which of the following statements are true about a workgroup?

Each correct answer represents a complete solution. Choose all that apply.

A It is usually designed for SOHOs including one to ten workers.

B All computers must be on the same local network.

C It provides single sign-on (SSO) capabilities.

  1. In a workgroup, all computers are peers.

 

 

What refers to an area between the Internet and an intranet that hosts resources for trusted entities?

A Internet

B Extranet

C Intranet

D Perimeter network

 

You work as a network designer at Certify Inc. The company’s network is based on TCP/IP. You are designing a network for a new branch of the

company. You need to divide the network into three subnets. Which of the following devices should you use?

A Hub

B repeater

C Router

D Modem

 

Which of the following describes a network that separates an organization’s private network from a public network?

A Perimeter

B Extranet

C Firewall

D Internet

 

Which command produces the following output?

 

Interface: 192.168.1.2 –0x3 Internet Address Physical Address

Type 790.168.1.1 00-16-57-69-2f-10 dynamic 192.168.1.255 ff-ff-ff-ff-ff-ffstatic 224.0.0.2 01-00-5e-00-00-02

static 224.0.0.22 01-00-5e-00-00-16 static 224.0.0.251 01-00-5e-00-00-fb

static 224.0.0.252 01-00-5e-00-00-fc

static 239.255.255.250

01-00-5e-7f-ff-fa

static 255.255.255.255

ff-ff-ff-ff-ff-ff static

A netstat

B nbtstat

C tracert

D arp-a

 

 

Which protocol uses broadcast transmissions to identify the Media Access Control (MAC) address of computers?

A FTP

B HTTP

C ARP

D RDS

 

This question requires that you evaluate the underlined text to determine if it is correct.

Every router today is TCP/IP” enabled, which is an industry standard suite of protocols designed for large networks consisting of network segments

connected by routers. It is the core protocol suite used on the Internet.

Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’ if the underlined text makes the

statement correct.

A No change is needed

B HTTP

C FTP

D SNMP

 

You work as a network administrator at Certify Inc. You need to configure a Cisco router with a hybrid protocol. Which of the following protocols satisfies

the above requirement?

AN

A OSPF

B EIGRP

C BGP

D IS-IS

 

 

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!