- web.groovymark@gmail.com
- December 3, 2024
Question 01
A network architect analyzes the software-defined networking model and reviews the layer that applies the business logic to decide how to prioritize traffic, secure data, and where to switch data. What is the appropriate layer for this description?
a) Application layer
b) Data link layer
c) Control layer
d) Transport layer
Correct Answer: a) Application layer
Explanation: The Application layer in SDN (Software Defined Networking) applies business logic and decides how to prioritize, secure, and switch traffic.
Question 02
When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer’s physical NIC, a network engineer creates a virtual switch that binds to the host’s NIC to allow the VM to communicate on the physical network. What switch did the network engineer create?
a) Internal
b) External
c) Private
d) Hybrid
Correct Answer: b) External
Explanation: An external virtual switch binds to the host's physical NIC to enable virtual machines to communicate with the physical network.
Question 03
While looking for a cloud deployment model for business operations, the network specialist looks for a model that a third party hosts for the organization’s exclusive use. Which cloud deployment model meets the network specialist’s and businesses’ needs?
a) Public
b) Private
c) Hybrid
d) Hosted Private
Correct Answer: d) Hosted Private
Explanation: A hosted private cloud is managed by a third party but is exclusively for a single organization's use.
Question 04
A network consultant is considering what technologies to use when adding a storage area network (SAN). What are the two most popular SAN connection types? (Select all that apply.)
a) Fibre Channel
b) iSCSI
c) SATA
d) USB
Correct Answer: a) Fibre Channel, b) iSCSI
Explanation: Fibre Channel and iSCSI are the two most commonly used technologies for SAN connections.
Question 05
While looking for a cloud service model for business, the network specialist looks for a model that allows the organization to rent components and internet links on an as-needed basis from the service provider’s data center. Which cloud service model meets the network specialist’s and businesses’ needs?
a) Platform as a Service
b) Software as a Service
c) Infrastructure as a Service
d) Database as a Service
Correct Answer: c) Infrastructure as a Service
Explanation: Infrastructure as a Service (IaaS) allows businesses to rent computing infrastructure, including network links and components, as needed.
Question 06
You are configuring a point-to-point link between two routers and have been assigned an IP of 77.81.12.14/30. What is the network ID associated with this IP assignment?
a) 77.81.12.10
b) 77.81.12.12
c) 77.81.12.13
d) 77.81.12.16
Correct Answer: b) 77.81.12.12
Explanation: A /30 subnet mask gives a block size of 4, and the network ID for this range would be 77.81.12.12.
Question 07
What is the network ID associated with the host located at 192.168.0.123/29?
a) 192.168.0.120
b) 192.168.0.124
c) 192.168.0.122
d) 192.168.0.126
Correct Answer: a) 192.168.0.120
Explanation: With a /29 subnet mask, the network ID for this host would be 192.168.0.120.
Question 08
Rick is configuring a Windows computer to act as a jump box on his network. He implements static routing to control the networks and systems the jump box communicates with. Which of the following commands did he use to configure this on the Windows machine?
a) route
b) netsh
c) arp
d) tracert
Correct Answer: a) route
Explanation: The "route" command is used to configure static routes on a Windows computer.
Question 09
You are trying to select the BEST network topology for a new network based on the following requirements. The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client’s requirements?
a) Star
b) Ring
c) Mesh
d) Bus
Correct Answer: b) Ring
Explanation: In a ring topology, redundancy is built into the design, and the token-passing mechanism ensures that devices communicate without congestion.
Question 10
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do?
a) Make the change, document the requester, and document all network changes
b) Wait for a formal change review meeting
c) Delay the change until the scheduled maintenance window
d) Consult with the networking team for their approval
Correct Answer: a) Make the change, document the requester, and document all network changes
Explanation: In an emergency change management process, the technician should proceed with the change and ensure that all documentation is completed.
Question 11
When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?
a) Forensics
b) eDiscovery
c) Data recovery
d) Chain of custody
Correct Answer: b) eDiscovery
Explanation: eDiscovery is the process of identifying, recovering, and exchanging electronic information for legal investigations.
Question 12
Your company wants to create highly available data centers. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?
a) OSPF
b) BGP
c) RIP
d) EIGRP
Correct Answer: b) BGP
Explanation: BGP (Border Gateway Protocol) allows for highly available networks, enabling a site to maintain an Internet presence even if the WAN connection fails.
Question 13
A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected?
a) Analyze firewall logs
b) Conduct a penetration test
c) Analyze packet captures
d) Perform a vulnerability scan
Correct Answer: c) Analyze packet captures
Explanation: Analyzing packet captures will allow the administrator to see what information is being sent out and confirm if software versioning is exposed.
Question 14
You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?
a) Port mirroring
b) Port security
c) VLAN tagging
d) MAC filtering
Correct Answer: b) Port security
Explanation: Port security can remember the first MAC address connected to a switch port and prevent unauthorized devices from accessing it.
Question 15
Scott is a brand new network technician at Dion Training. He has been told to remote into the edge switch from his desk and enable DHCP snooping. Which of the following commands should he use?
a) SSH
b) FTP
c) Telnet
d) SCP
Correct Answer: c) Telnet
Explanation: Telnet is a protocol that allows remote access to network devices, though it is not as secure as SSH.
Question 16
You are installing a new LAN in a building your company just purchased. The building is older, but your company has decided to install a brand-new Cat 6a network in it before moving in. You are trying to determine whether to purchase plenum or PVC cabling. Which environmental conditions should be considered before making the purchase?
a) Ceiling height
b) Air duct placement
c) Building age
d) Number of floors
Correct Answer: b) Air duct placement
Explanation: Plenum cabling is used in areas where air circulates, such as air ducts, due to its fire-resistant properties.
Question 17
Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera’s security concerns? (Select the best two.)
a) Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password
b) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet
c) Disable the thermostat’s wireless functionality
d) Enable guest Wi-Fi for the thermostat
Correct Answer: a) Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password, b) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet
Explanation: Using strong encryption and a segregated network ensures that the device is better protected from hackers.
Question 18
Andy is a network technician who is preparing to configure a company’s network. He has installed a firewall to segment his network into an internal network, a DMZ or screen subnet, and an external network. No hosts on the internal network should be directly accessible by their IP address from the Internet, but they should be able to reach remote networks if they have been assigned an IP address within the network. Which of the following IP addressing solutions would work for this particular network configuration?
a) NAT
b) Public IP addressing
c) Anycast addressing
d) Global unicast addressing
Correct Answer: a) NAT
Explanation: NAT (Network Address Translation) allows internal hosts to access external networks without exposing their private IP addresses
Question 19
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
a) Hypervisor
b) Control plane
c) Guest OS
d) Physical hardware
Correct Answer: d) Physical hardware
Explanation: In a bare-metal virtualization environment, the physical hardware is the lowest layer, on top of which the hypervisor runs.
Question 20
Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? (Select the best two.)
a) GPS location
b) NAC
c) MAC filtering
d) VLAN tagging
Correct Answer: a) GPS location, b) NAC
Explanation: GPS location can verify a user's physical location, while NAC (Network Access Control) can ensure compliance with network policies.