Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection ( OSI ) Reference Model is she

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working?
Question 1 options:
Application
Presentation
Session
Physical
Question 2(1 point)
On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN.
Question 2 options:
firewall
router
server
switch
Question 3(1 point)
Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?
Question 3 options:
Internet Small Computer System Interface (iSCSI)
Fibre Channel (FC)
Fibre Channel over Ethernet (FCoE)
Secure Shell (SSH)
Question 4(1 point)
Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use?
Question 4 options:
Network access control (NAC)
Virtual LAN (VLAN)
Virtual private network (VPN)
Transport Layer Security (TLS)
Question 5(1 point)
Carrie is a network technician developing the Internet Protocol (IP) addressing roadmap for her company. While IP version 4(IPv4) has been the standard for decades, IP version 6(IPv6) can provide a much greater number of unique IP addresses. Which addressing system should she designate for primary use on her roadmap and why?
Question 5 options:
IPv6 is rapidly replacing IPv4 worldwide. She should make IPv6 the primary addressing scheme in her roadmap.
IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted.
Few commercial businesses still use IPv4. She should feature IPv6 strongly in her roadmap rather than have her company fall behind technologically.
There will be adequate IPv4 addresses available well into the future. She should make IPv4 the primary addressing scheme.
Question 6(1 point)
A ________ is used to identify the part of an Ethernet network where all hosts share the same host address.
Question 6 options:
router
subnet mask
access point
switch
Question 7(1 point)
Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n)________, which is a short number that tells a receiving device where to send messages it receives.
Question 7 options:
ping
Internet Protocol (IP) address
Media Access Control (MAC) address
network port
Question 8(1 point)
What protocol is responsible for assigning Internet Protocol (IP) addresses to hosts on many networks?
Question 8 options:
Dynamic Host Configuration Protocol (DHCP)
Transport Layer Security (TLS)
IP
Simple Mail Transfer Protocol (SMTP)
Question 9(1 point)
What network port number is used for unencrypted web-based communication by default?
Question 9 options:
80
143
443
3389
Question 10(1 point)
Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?
Question 10 options:
Teardrop
Land
Smurf
Cross-site scripting (XSS)
Question 11(1 point)
Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?
Question 11 options:
Network access control (NAC)
Virtual LAN (VLAN)
Virtual private network (VPN)
A demilitarized zone (DMZ)
Question 12(1 point)
Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?
Question 12 options:
Packet filtering
Application proxying
Stateful inspection
Network address translation
Question 13(1 point)
What firewall approach is shown in the figure, assuming the firewall has three network cards?
Question 13 options:
Border firewall
Bastion host
Screened subnet
Unified threat management
Question 14(1 point)
Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?
Question 14 options:
Firewall
Unified threat management (UTM)
Router
VPN concentrator

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions