Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection ( OSI ) Reference Model is she
Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection OSI Reference Model is she working?
Question options:
Application
Presentation
Session
Physical
Question point
On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network LAN Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a that controls a portion of the LAN.
Question options:
firewall
router
server
switch
Question point
Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?
Question options:
Internet Small Computer System Interface iSCSI
Fibre Channel FC
Fibre Channel over Ethernet FCoE
Secure Shell SSH
Question point
Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use?
Question options:
Network access control NAC
Virtual LAN VLAN
Virtual private network VPN
Transport Layer Security TLS
Question point
Carrie is a network technician developing the Internet Protocol IP addressing roadmap for her company. While IP version IPv has been the standard for decades, IP version IPv can provide a much greater number of unique IP addresses. Which addressing system should she designate for primary use on her roadmap and why?
Question options:
IPv is rapidly replacing IPv worldwide. She should make IPv the primary addressing scheme in her roadmap.
IPv is only slowly being adopted. She should make IPv the primary addressing scheme in her roadmap until IPv is more widely adopted.
Few commercial businesses still use IPv She should feature IPv strongly in her roadmap rather than have her company fall behind technologically.
There will be adequate IPv addresses available well into the future. She should make IPv the primary addressing scheme.
Question point
A is used to identify the part of an Ethernet network where all hosts share the same host address.
Question options:
router
subnet mask
access point
switch
Question point
Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use an which is a short number that tells a receiving device where to send messages it receives.
Question options:
ping
Internet Protocol IP address
Media Access Control MAC address
network port
Question point
What protocol is responsible for assigning Internet Protocol IP addresses to hosts on many networks?
Question options:
Dynamic Host Configuration Protocol DHCP
Transport Layer Security TLS
IP
Simple Mail Transfer Protocol SMTP
Question point
What network port number is used for unencrypted webbased communication by default?
Question options:
Question point
Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol ICMP echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?
Question options:
Teardrop
Land
Smurf
Crosssite scripting XSS
Question point
Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?
Question options:
Network access control NAC
Virtual LAN VLAN
Virtual private network VPN
A demilitarized zone DMZ
Question point
Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?
Question options:
Packet filtering
Application proxying
Stateful inspection
Network address translation
Question point
What firewall approach is shown in the figure, assuming the firewall has three network cards?
Question options:
Border firewall
Bastion host
Screened subnet
Unified threat management
Question point
Bob has a highvolume virtual private network VPN He would like to use a device that would best handle the required processing power. What type of device should he use?
Question options:
Firewall
Unified threat management UTM
Router
VPN concentrator
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started