IS5203 Week 7 Quizes

1. You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____

Full

2. Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?

200 GB

3. You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?

Changes since the full backup

4. When restoring a backup, which of them is likely to be most time consuming to restore?

Incremental

5. You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?

SNMP

6. Refer to the following statements. Within the operation of the SNMP protocol, which of the following describes a MIB correctly?

Statements 1 and 2

7. You have added a new device to the network management application. What else should you add to the network management application to be able to control it?

MIB

8. A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?

Network performance baseline

9. What kind of information would you expect to find within a network device’s event log? [Choose all that apply].

Event descriptions

Time of events

10. Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?

Compare network performance to baselines

11. To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?

Offline folders

12. You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?

SNMP

13. Refer to the exhibit. Which of the following configuration is being displayed?

Fault tolerance

14. Which of the following is true about Load balancing on a network?
1) Provides redundancy
2) Provides an increase in throughput
3) Increases CPU resources

Statements 1 and 2 are true

15. Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

Online UPS

16. Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

17. What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

DiffServ

18. What port do SNMP agents listen on?

Port 161

19. Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic shaping

20. What command requests the next record in an SNMP log?

SNMP Get Next

21. When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

22. While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

Wireshark

23. One of your coworkers downloaded several, very large video files for a special project she’s working on for a new client. When you run your network monitor later this afternoon, what list will your coworker’s computer likely show up on?

Top listeners

24. Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold site

25. At what layer of the OSI model do proxy servers operate?

Layer 7

26. Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?

a. Application data
b. Destination IP address
c. ICMP message
d. SYN flags

27. Who is responsible for the security of hardware on which a public cloud runs?

a. The cloud provider
b. The cloud customer
c. It depends
d. Both the cloud customer and the cloud provider

28. Which of the following is not one of the AAA services provided by RADIUS and TACACS+?

a. Accounting
b. Authentication
c. Authorization
d. Administration

29. Which device would allow an attacker to make network clients use an illegitimate default gateway?

a. Proxy server
b. DHCP server
c. RA guard
d. Network-based firewall

30. Active Directory and 389 Directory Server are both compatible with which directory access protocol?

a. RADIUS
b. LDAP
c. AD DS
d. Kerberos

31. What information in a transmitted message might an IDS use to identify network threats?

a. ACL
b. Signature
c. Port mirroring
d. FIM

32. Which policy ensures messages are discarded when they don’t match a specific firewall rule?

a. Explicit deny
b. Explicit allow
c. Implicit deny
d. Implicit allow

33. Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

a. access-list acl_2 permit https any any
b. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www
c. access-list acl_2 deny tcp any any
d. access-list acl_2 permit icmp any any

34. Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

a. Shared responsibility model
b. Separation of duties
c. Defense in depth
d. Principle of least privilege

35. You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?

DHCP Snooping

36. You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?

Create Private VLANs

37. You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?

Move the ports from the default VLAN to a new, unused VLAN and then disable them

38. Which of the following versions of SNMP are considered unsecure? [Choose all that apply]

SNMPv2c

SNMPv1

39. You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?

Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement

40. You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?

Check the IP routing table

41. You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?

VLAN assignment

42. You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?

Broadcast storm

43. You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?

Windows firewall is enabled, and port 8443 is not allowing traffic

44. You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?

traceroute

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *