Читать книгу CompTIA Network+ Practice Tests - Craig Zacker - Страница 8

Chapter 1 Networking Fundamentals

Оглавление

THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

 1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts.OSI modelLayer 1 – PhysicalLayer 2 – Data linkLayer 3 – NetworkLayer 4 – TransportLayer 5 – SessionLayer 6 – PresentationLayer 7 – ApplicationData encapsulation and decapsulation within the OSI model contextEthernet headerInternet Protocol (IP) headerTransmission Control Protocol (TCP)/ User Datagram Protocol (UDP) headersTCP flagsPayloadMaximum transmission unit (MTU)

 1.2 Explain the characteristics of network topologies and network types.MeshStar/hub-and-spokeBusRingHybridNetwork types and characteristicsPeer-to-peerClient-serverLocal area network (LAN)Metropolitan area network (MAN)Wide area network (WAN)Wireless local area network (WLAN)Personal area network (PAN)Campus area network (CAN)Storage area network (SAN)Software-defined wide area network (SDWAN)Multiprotocol label switching (MPLS)Multipoint generic routing encapsulation (mGRE)Service-related entry pointDemarcation pointSmartjackVirtual network conceptsvSwitchVirtual network interface card (vNIC)Network function virtualization (NFV)HypervisorProvider linksSatelliteDigital subscriber line (DSL)CableLeased lineMetro-optical

 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution.CopperTwisted pairCat 5Cat 5eCat 6Cat 6aCat 7Cat 8Coaxial/RG-6TwinaxialTermination standardsTIA/EIA-568ATIA/EIA-568BFiberSingle-modeMultimodeConnector typesLocal connector (LC), straight tip (ST), subscriber connector (SC), mechanical transfer (MT), registered jack (RJ)Angled physical contact (APC)Ultra-physical contact (UPC)RJ11RJ45F-type connectorTransceivers/media convertersTransceiver typeSmall form-factor pluggable (SFP)Enhanced form-factor pluggable (SFP+)Quad small form-factor pluggable (QSFP)Enhanced quad small form-factor pluggable (QSFP+) Cable managementPatch panel/patch bayFiber distribution panelPunchdown block66110KroneBixEthernet standardsCopper10BASE-T100BASE-TX1000BASE-T10GBASE-T40GBASE-TFiber100BASE-FX100BASE-SX1000BASE-SX1000BASE-LX10GBASE-SR10GBASE-LRCoarse wavelength division multiplexing (CWDM)Dense wavelength division multiplexing (DWDM)Bidirectional wavelength division multiplexing (WDM)

 1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes.Public vs. privateRFC1918Network address translation (NAT)Port address translation (PAT)IPv4 vs. IPv6Automatic Private IP Addressing (APIPA)Extended unique identifier (EUI-64)MulticastUnicastAnycastBroadcastLink localLoopbackDefault gatewayIPv4 subnettingClassless (variable-length subnet mask)ClassfulABCDEClassless Inter-Domain Routing (CIDR) notationIPv6 conceptsTunnelingDual stackShorthand notationRouter advertisementStateless address autoconfiguration (SLAAC)Virtual IP (VIP)Subinterfaces

 1.5 Explain common ports and protocols, their application, and encrypted alternatives.ProtocolsPortsFile Transfer Protocol (FTP)20/21Secure Shell (SS)22Secure File Transfer Protocol (SFT)22Telnet23Simple Mail Transfer Protocol (SMTP)25Domain Name System (DNS)53Dynamic Host Configuration Protocol (DHCP)67/68Trivial File Transfer Protocol (TFTP)69Hypertext Transfer Protocol (HTTP)80Post Office Protocol v3 (POP3)110Network Time Protocol (NTP)123Internet Message Access Protocol (IMAP)143Simple Network Management Protocol (SNMP)161/162Lightweight Directory Access Protocol (LDAP)389Hypertext Transfer Protocol Secure (HTTPS) [Secure Sockets Layer (SSL)]443HTTPS [Transport Layer Security (TLS)]443Server Message Block (SMB)445Syslog514SMTP TLS587Lightweight Directory Access Protocol (over SSL) (LDAPS)636IMAP over SSL993POP3 over SSL995Structured Query Language (SQL) Server1433SQLnet1521MySQL3306Remote Desktop Protocol (RDP)3389Session Initiation Protocol (SIP)5060/5061IP protocol typesInternet Control Message Protocol (ICMP)TCPUDPGeneric Routing Encapsulation (GRE)Internet Protocol Security (IPSec)Authentication Header (AH)/Encapsulating Security Payload (ESP)Connectionless vs. connection-oriented

 1.6 Explain the use and purpose of network services.DHCPScopeExclusion rangesReservationDynamic assignmentStatic assignmentLease timeScope optionsAvailable leasesDHCP relayIP helper/UDP forwardingDNSRecord typesAddress (A)Canonical name (CNAME)Mail exchange (MX)Authentication, authorization, accounting, auditing (AAAA)Start of authority (SOA)Pointer (PTR)Text (TXT)Service (SRV)Name server (NS)Global hierarchyRoot DNS serversInternal vs. externalZone transfersAuthoritative name serversTime to live (TTL)DNS cachingReverse DNS/reverse lookup/forward lookupRecursive lookup/iterative lookupNTPStratumClientsServers

 1.7 Explain basic corporate and datacenter network architecture.Three-tieredCoreDistribution/aggregation layerAccess/edgeSoftware-defined networkingApplication layerControl layerInfrastructure layerManagement planeSpine and leafSoftware-defined networkTop-of-rack switchingBackbone Traffic flowsNorth-SouthEast-WestBranch office vs. on-premises datacenter vs. colocationStorage area networksConnection typesFibre Channel over Ethernet (FCoE)Fibre ChannelInternet Small Computer Systems Interface (iSCSI)

 1.8 Summarize cloud concepts and connectivity options.Deployment modelsPublicPrivateHybridCommunityService modelsSoftware as a service (SaaS)Infrastructure as a service (IaaS)Platform as a service (PaaS)Desktop as a service (DaaS)Infrastructure as codeAutomation/orchestrationConnectivity optionsVirtual private network (VPN)Private-direct connection to cloud providerMultitenancyElasticityScalabilitySecurity implications

1 At which of the following layers of the Open Systems Interconnection (OSI) model do the protocols on a typical local area network (LAN) use media access control (MAC) addresses to identify other computers on the network?PhysicalData linkNetworkTransport

2 Which of the following organizations developed the Open Systems Interconnection (OSI) model?International Telecommunication Union (ITU-T)Comité Consultatif International Télégraphique et Téléphonique (CCITT)American National Standards Institute (ANSI)Institute of Electrical and Electronics Engineers (IEEE)International Organization for Standardization (ISO)

3 Which layer of the Open Systems Interconnection (OSI) model is responsible for the logical addressing of end systems and the routing of datagrams on a network?PhysicalData linkNetworkTransportSessionPresentationApplication

4 On a TCP/IP network, which layers of the Open Systems Interconnection (OSI) model contain protocols that are responsible for encapsulating the data generated by an application, creating the payload for a packet that will be transmitted over a network? (Choose all that apply.)PhysicalData linkNetworkTransportSessionPresentationApplication

5 What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information?PhysicalData linkNetworkTransportSessionPresentationApplication

6 Which of the following devices typically operates at the network layer of the Open Systems Interconnection (OSI) model?Proxy serverHubNetwork interface adapterRouter

7 Which layer of the Open Systems Interconnection (OSI) model provides an entrance point to the protocol stack for applications?PhysicalData linkNetworkTransportSessionPresentationApplication

8 Which layer of the Open Systems Interconnection (OSI) model is responsible for dialogue control between two communicating end systems?PhysicalData linkNetworkTransportSessionPresentationApplication

9 Some switches can perform functions associated with two layers of the Open Systems Interconnection (OSI) model. Which two of the following layers are often associated with network switching? (Choose all that apply.)PhysicalData linkNetworkTransportSessionPresentationApplication

10 At which layer of the Open Systems Interconnection (OSI) model are there TCP/IP protocols than can provide either connectionless or connection-oriented services to applications?PhysicalData linkNetworkTransportSessionPresentationApplication

11 Which of the following layers of the Open Systems Interconnection (OSI) model typically have dedicated physical hardware devices associated with them? (Choose all that apply.)PhysicalData linkNetworkTransportSessionPresentationApplication

12 At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?PhysicalData linkNetworkTransportSessionPresentationApplication

13 Identify the layer of the Open Systems Interconnection (OSI) model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)Data link layer; CSMA/CDData link layer; CSMA/CA

14 At which layer of the OSI model do you find the protocol responsible for the delivery of data to its ultimate destination on an internetwork?Data linkNetworkSessionApplication

15 Which of the following is not a protocol operating at the network layer of the OSI model?IPICMPIGMPIMAP

16 Ed is a software developer who has been given the task of creating an application that requires guaranteed delivery of information between end systems. At which layer of the Open Systems Interconnection (OSI) model does the protocol that provides the guaranteed delivery run, and what type of protocol must Ed use?Data link layer; connectionlessNetwork layer; connection-orientedTransport layer; connection-orientedApplication layer; connectionless

17 Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model?HubBridgeSwitchRouter

18 Alice is a network administrator designing a new Local Area Network (LAN). She needs to determine the type of cabling and the network topology to implement. Which layers of the Open Systems Interconnection (OSI) model apply to cabling and topology elements?Physical and data link layersData link and network layersNetwork and transport layersTransport and application layers

19 Which layers of the Open Systems Interconnection (OSI) model do not have protocols in the TCP/IP suite exclusively dedicated to them? (Choose all that apply.)PhysicalData linkNetworkTransportSessionPresentationApplication

20 The protocols at which layer of the Open Systems Interconnection (OSI) model use port numbers to identify the applications that are the source and the destination of the data in the packets?ApplicationPresentationTransportNetwork

21 Which of the following is a correct listing of the Open Systems Interconnection (OSI) model layers, in order, from top to bottom?Physical, data link, transport, network, session presentation, applicationApplication, session, presentation, transport, network, data link, physicalPresentation, application, transport, session, network, physical, data linkSession, application, presentation, transport, data link, network, physicalApplication, presentation, session, transport, network, data link, physical

22 At which of the Open Systems Interconnection (OSI) model layers do switches and bridges perform their basic functions?PhysicalData linkNetworkTransport

23 On a TCP/IP network, flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?PresentationSessionTransportNetwork

24 Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?PhysicalData linkNetworkTransportSessionPresentationApplication

25 Which of the OSI model layers is responsible for syntax translation and compression or encryption?Data linkNetworkSessionPresentationApplication

26 Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?PhysicalData linkNetworkTransportSessionPresentationApplication

27 Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.Network; connection-orientedNetwork; connectionlessTransport; connection-orientedTransport; connectionless

28 An Ethernet network interface adapter provides functions that span which two layers of the Open Systems Interconnection (OSI) model?Physical and data linkData link and networkNetwork and transportTransport and application

29 Which of the following protocols operate at the application layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)HTTPSNMPICMPIGMPUDP

30 Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?ApplicationPresentationSessionPhysical

31 Which of the following protocols operates at the network layer of the OSI model, but does not encapsulate data generated by an upper layer protocol for transmission over the network?IPUDPARPICMPTCP

32 A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of the TCP flags raised in the Transmission Control Protocol (TCP) session establishment messages?SYN, ACK, SYN, ACKSYN, SYN, ACK, ACKSYN/ACK, SYN/ACKSYN, SYN/ACK, ACK

33 Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?512102415001518

34 Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?SYNURGFINENDPSH

35 An electrician installing a new light fixture accidentally severs one of the LAN cables running through the dropped ceiling space. With which topology would the severed cable cause the greatest amount of disturbance to the network?BusStarLogical ringMesh

36 Which of the following statements about a wired Local Area Network (LAN) is true?Wired LANs support only the star topology.Wired LANs support only the star and bus topologies.Wired LANs support only the star and ring topologies.Wired LANs can support ring, bus, or star topologies.

37 Which of the following is an example of a hybrid topology?A workstation with two network interface cards, one of which is connected to a star network and one to a bus networkFour Ethernet switches connected using a bus topologyFour workstations, each with a separate network connection to each of the other threeFour Ethernet switches, each with a separate network connection to each of the other three

38 Which type of network is typically confined to a small area, such as a single room, floor, or building?WANLANMANCAN

39 Which type of network connects Local Area Networks (LANs) in distant locations?WANLANMANCAN

40 Which of the following topologies requires the installation of terminating resistors at two locations?BusStarRingMesh

41 Which of the following topologies is used by the majority of new Ethernet networks installed today?BusVirtual ringMeshHierarchical star

42 Alice has constructed a five-node failover cluster in which all five servers are connected to a hard disk array using a dedicated Fibre Channel network. Which of the following terms describes this network arrangement?SANPANWANMAN

43 Which of the following is not a technology typically used for a personal area network (PAN)?BluetoothZ-WaveNFCSDWAN

44 Which of the following network topologies are used by Wireless Local Area Networks (WLANs)? (Choose all that apply.)Ad hocBusInfrastructureStar

45 Which of the following cabling topologies was used by the first Ethernet networks?BusRingStarMesh

46 On an Ethernet network using the star topology, which of the following devices can function as the cabling nexus that forms the figurative center of the star? (Choose all that apply.)HubRouterSwitchAccess Point

47 Which of the following cabling topologies provides the greatest number of redundant paths through the network?StarRingMeshBus

48 Which of the following Ethernet physical layer options does not use the star topology?10Base210Base-T100Base-TX1000Base-T

49 Which of the following network types are typically wireless? (Choose all that apply.)WANPANSANWLAN

50 Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?Digital Subscriber Line (DSL)Metro-opticalSatelliteCable

51 Which of the following statements is true about the differences between a peer-to-peer network and a client-server network?Peer-to-peer networks are inherently less secure than client-server networks.Peer-to-peer networks are illegal, while client-server networks are legal.On peer-to-peer networks, every workstation is capable of authenticating users.On a peer-to-peer network, all workstations must share their resources.

52 Why does DSL (Digital Subscriber Line) technology support faster data transmissions than a standard Public Switched Telephone Network (PSTN) modem connection?DSL uses a separate control circuit that provides clear channels for data.DSL does not perform Cyclic Redundancy Check (CRC) functions and therefore has less overhead.DSL performs only a single analog-to-digital conversion.DSL uses a higher frequency range.

53 Which DSL (Digital Subscriber Line) technology can adjust its transmission speed based on line conditions?HDSLIDSLRADSLVDSL

54 Which of the following Wide Area Network (WAN) technologies uses broadband signaling?Digital Subscriber Line (DSL)Synchronous Optical Network (SONET)Integrated Services Digital Network (ISDN)Cable television (CATV)

55 Ed has been hired by a private company to connect two remote sites with a Wide Area Network (WAN). Each of these sites has more than 200 users, and they all need to constantly transfer files across the WAN. One of the sites has a customer database that is accessed by both sites at all hours of the day. Access to the database and other information is time sensitive and constant. The company estimates that their aggregate bandwidth needs to be approximately 40 Mbps. Management says that they need to guarantee access to this information and that money is not a factor in the WAN implementation. Which WAN technology should Ed recommend for this scenario?A standard modem-to-modem connectionA T-3 dedicated leased lineA cable television (CATV) connectionAn ADSL (Asymmetrical Digital Subscriber Line) connection

56 Ralph is an employee of a company that offers the option to telecommute from home. As a telecommuting employee, he needs to connect to the company network to access client information, transfer files, and send email through a Virtual Private Network (VPN) connection. Ralph is investigating the different Wide Area Network (WAN) services available for the remote connection before he implements one. His home is over 30 years old; the existing telephone wiring was not run through conduit, and the wiring seems to be deteriorating. Ralph has cable television (CATV) service, and his home is also approximately 20,000 feet from the nearest telephone central office. He wants to implement the fastest remote connection service possible, but cost is a factor in the decision. Which WAN technology should Ralph implement?A dedicated leased line (fractional T-1)A standard modem-to-modem connectionA DSL (Digital Subscriber Line) connectionA broadband CATV connection

57 Which of the following Wide Area Network (WAN) connection technologies uses analog signaling?Public Switched Telephone Network (PSTN)Cable television (CATV)Digital Subscriber Line (DSL)Synchronous Optical Network (SONET)

58 If you want to allow both voice and data traffic to be transmitted across the same Digital Subscriber Line (DSL) connection, what type of device is required at the customer site?A signal terminatorA Digital Subscriber Line Access Multiplexer (DSLAM)A coder/decoder (CODEC) deviceA splitter

59 What are the two main factors that affect DSL (Digital Subscriber Line) transmission rates?Signal terminationDistance to the nearest central officeLine conditionsLine reflection

60 Which of the following best describes the function of a demarcation point or demarc?The vertical cross-connect that links horizontal networks togetherThe place where an outside service enters the buildingA switch or hub that connects the computers in a particular work area together, forming a horizontal networkThe place in a telecommunications room where a patch panel is located

61 Which of the following broadband WAN services provides equal amounts of upstream and downstream bandwidth?ADSLSDSLSatelliteCable

62 Which of the following hardware components is typically found at the demarcation point of a leased line, such as a T-1 or T-3?TerminatorPunchdown block110 blockSmartjackCSU/DSU

63 Which of the following remote access connection technologies can support the simultaneous transmission of voice and data traffic over the Public Switched Telephone Network (PSTN)? (Choose all that apply.)Dial-up modem connectionIntegrated Services Digital Network (ISDN)Digital Subscriber Line (DSL)Synchronous Optical Network (SONET)Cable television (CATV) network

64 A company is moving their entire operation to a new building, and part of the plan is to increase the speed of their Internet access by installing a leased T-3 line to replace their existing broadband connection. The service provider they have selected sends a technician to install the leased line. Which of the following is the correct term for the location in the new building where the technician will terminate the T-3?Patch panelSwitchFirewallDemarc

65 A T-3 leased line connection runs at 44.736 megabits per second (Mbps). How many separate channels does a T-3 provide?2464128512672

66 A T-3 leased line connection is the equivalent of how many T-1 connections?71428112

67 Which of the following is the U.S. standard for synchronous data transmissions that defines data rates designated by optical carrier levels, such as OC-3, OC-12, OC-48, and OC-192?SDHSONETISDNDSL

68 Which of the following is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses?Frame relayMPLSATMPPPoESDWAN

69 Which two of the following constructs provide roughly the same function? (Choose two that apply.)SIP trunkCSU/DSUVoIP gatewaySmartjackVPN concentrator

70 Which of the following is the European equivalent of the Synchronous Optical Networking (SONET) standard in the United States?SDHOC-3E-3ATM

71 Which of the following is the device that provides the interface between a Local Area Network (LAN) and a Wide Area Network (WAN)?QSFPCSU/DSUSIP trunkIDS/IPS

72 Which of the following terms describes a leased line subscription that provides access to only part of a T-1?E-1B channelOC-1Fractional T-1

73 Multiprotocol Label Switching (MPLS) is sometimes said to operate between two layers of the Open Systems Interconnection (OSI) model. Between which two layers is it usually said to function?Physical and data linkData link and networkNetwork and transportTransport and Session

74 Which of the following Wide Area Network (WAN) services provides the fastest transfer rate?T-1E-1T-3OC-1

75 To which of the following Internet connection types does a specification called DOCSIS apply?Dial-up modemDSLCable broadbandISDN

76 Which of the following are types of circuits offered by frame relay services? (Choose all that apply.)SRVPVCSVCUPC

77 Which of the following types of Wide Area Network (WAN) connections commonly use Point-to-Point Protocol over Ethernet (PPPoE)? (Choose all that apply.)Leased linesSONETCable broadbandDigital Subscriber Line (DSL)

78 Which of the following devices often provides diagnostic testing capabilities at the demarcation point of a leased line Wide Area Network (WAN) service?SIP trunkMedia converterSmartjackAAAA server

79 Which of the following Wide Area Network (WAN) services typically uses a switched fabric that was called a cloud long before the term came into general use?ATMFractional T-1SONETFrame relay

80 Ralph has been contracted to consult for a company that wants to update its legacy Ethernet network to Gigabit Ethernet. On examining the site, he discovers that the network is still using coaxial-based Thin Ethernet. What change in network topology must occur to upgrade the existing network to Gigabit Ethernet using Unshielded Twisted Pair (UTP) cable?Bus to RingRing to StarStar to BusBus to StarStar to Ring

81 Which of the following best describes the function of a vSwitch (or virtual switch)?A vSwitch is a software product that enables a computer with multiple network adapters to function as a switch.A vSwitch is a feature in layer 3 switches that enables VLANs on the same switch to communicate with each other.A vSwitch is a feature in layer 3 switches that enables VLANs on different switches to communicate with each other.A vSwitch enables virtual machines (VMs) running on the same hypervisor to communicate with each other internally.

82 Which of the following statements best describes the difference between Type I and Type II virtualization?Type II virtualization requires the host computer to have a processor that supports hardware virtualization assistance; Type I virtualization does not.In Type I virtualization, the hypervisor runs directly on the physical computer hardware, whereas in Type II virtualization, a host operating system runs on the computer hardware and the hypervisor runs on top of the host OS.Type I virtualization supports up to 256 virtual machines, whereas Type II virtualization supports only 8.Type I virtualization requires a separate processor for each virtual machine, whereas in Type II virtualization, the VMs all share a single processor.

83 On which of the following virtual networking components can you create VLANs?Virtual NICVirtual switchVirtual routerVirtual firewall

84 On an unmanaged network, which of the following virtual networking components have media access control (MAC) addresses assigned to them?Virtual switchesVirtual NICsHypervisorsVirtual firewalls

85 Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?HypervisorVirtual servervSwitch (virtual switch)VPN concentrator

86 Which of the following is the proper term for a computer with a hypervisor on which you can create virtual machines and other virtual components?GuestNASHostSAN

87 In which of the following ways does a vSwitch (virtual switch) differ from a physical switch?Virtual switches have an unlimited number of ports, whereas physical switches have a specific number.Physical switches typically support the creation of VLANs, whereas virtual switches do not.Virtual switches cannot forward traffic to the host server running them, whereas physical switches can forward traffic to all connected computers.Physical switches always include layer 3 functionality, whereas virtual switches do not.

88 In which of the following components can a virtual firewall be implemented?On a host operating systemOn a guest operating systemIn a dedicated virtual machineIn a virtual switchAll of the above

89 Which of the following technologies can replace leased lines, such as T-1s, by multiplexing signals as packets switched through virtual circuits in a cloud?E-1sFrame relayATMPPP

90 Which of the following is not a protocol that uses tunneling to establish secured links between TCP/IP systems?L2TPIPsecMGRENAT

91 Which of the following is not one of the primary components of the Network Function Virtualization (NFV) framework?VNFNFV ISGNFVINFV-MANO

92 Which of the following best describes the function of the network medium?The network medium provides the physical connection between networked computers.The network medium provides the protocol used to transmit data between end systems.The network medium passes data packets between two routers.The network medium processes electrical or light signals and converts them to data.

93 Which of the following signal types is carried by copper cable?Fiber opticMicrowaveInfraredElectrical

94 Identify the organizations that developed the general cable type standards for voice and data communications that are currently in use and identify the document name.ANSI/TVA, document C568TWA/ANSI/EIA, document T530-AEIA/ANSI/TWA, document 802.2TDA/EIA/TIA, document 802.11ANSI/TIA/EIA, document T568b

95 Which of the following cable types and connectors are used to attach a television set to a cable television (CATV) network?A fiber-optic cable and a Straight Tip (ST) connectorA coaxial cable and a Bayonet-Neill-Concelman (BNC) connectorA twisted pair cable and an RJ-45 connectorA coaxial cable and an F-type connectorAn AUI cable and a vampire tap connectorA twinaxial cable and a Bayonet-Neill-Concelman (BNC) connector

96 Which of the following cable types is used for Thick Ethernet network segments?RG-8RG-58RJ-45RJ-11

97 Which of the following cable types is used for Thin Ethernet network segments?RG-8RG-58RJ-45RJ-11

98 Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?66 block110 blockPatch panelSmartjack

99 Which of the following is a common European alternative to the 110 punchdown block used in U.S. telecommunications installations?66 blockmGREKrone LSA-PlusBIX

100 Which of the following coaxial cable types are still in general use? (Choose all that apply.)RG-6RG-8RG-58RG-59

101 Which of the following statements about the differences between fiber-optic Angled Physical Contact (APC) and Ultra-Physical Contact (UPC) connectors are true? (Choose all that apply.)APCs should only be joined to other APCs.APCs generate more insertion loss that UPCs.UPCs generate more return loss than APCs.UPCs use a green connector boot or body.

102 Which of the following is not a type of fiber-optic connector?SCMTRJSTBNC

103 Which of the following physical layer transceiver module standards is the oldest and therefore the most obsolete?SFPSFP+GBICQSFPQSFP+

104 Which of the following cable types is typically configured in a star topology, uses eight copper conductors arranged in four pairs, and uses RJ-45 connectors?RG-8Twisted pairRG-58Fiber optic

105 Which of the following statements explains the purpose of the twists in twisted pair cabling?The twists prevent collisions.The twists completely eliminate crosstalk and electromagnetic interference (EMI) in adjacent wire pairs.The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.The twists extend the bend radius allowance of the cable.

106 Which of the following tools do cable installers use to add connectors such as RJ-45 and RJ-11 to twisted pair cabling?A crimperA splicerA pigtailA patch

107 Which of the following combinations of attributes describes the cable used for a Thin Ethernet network?RJ-45, 50-ohm, 0.270-inch, coaxial cable with BNC connectorsRG-59, 75-ohm, 0.242-inch, coaxial cable with F connectorsRG-58, 50-ohm, 0.195-inch, coaxial cable with BNC connectorsRG-8, 50-ohm, 0.405-inch, coaxial cable with N connectorsRJ-6, 75-ohm, 0.242-inch, coaxial cable with BNC connectors

108 Which of the following connector types are typically associated with Ethernet networks? (Choose all that apply.)F-typeBNCRJ-45DB-9N-type

109 Which of the following connector types was typically associated with a T-connector attached to the computer?RJ45MT-RJ8P8CBNCF

110 Which of the following connector types are associated with fiber-optic cables? (Choose all that apply.)RJ11STFLCMT-RJ

111 Which of the following types of cable, when installed, sometimes employed a device called a vampire tap?Unshielded twisted pairShielded twisted pairMultimode fiber opticSingle-mode fiber opticCoaxial

112 In an internal UTP cable installation, each horizontal cable run connects a wall plate in the work area to a centralized cabling nexus in a telecommunications room. Which of the following is the correct term for this cabling nexus?TelepoleDemarcBackbonePatch panelFiber distribution panel

113 Which of the following statements about single-mode and multimode fiber-optic cables are true?Single-mode cables can span longer distances than multimode cables.Single-mode cables are more resistant to electromagnetic interference than multimode cables.Single-mode cables are more difficult to install than multimode cables.Single-mode cables have a much larger core diameter than multimode cables.

114 Which of the following components are typically used only for telephone cable installations, and not for data networking? (Choose all that apply.)66 blocks110 blocks25 pair UTP cables100 pair UTP cables

115 Which of the following statements about single-mode fiber-optic cable are true? (Choose all that apply.)Single-mode cables use an LED light source, whereas multimode cables use a laser.Single-mode cables can span longer distances than multimode cables.Single-mode cables have a smaller core filament than multimode cables.Single-mode cables have a smaller bend radius than multimode, making them easier to install.Single-mode fiber-optic cables require a ground, whereas multimode cables do not.

116 Which of the following tools do cable installers use to connect bulk cable runs to wall plates and patch panels?A crimperA splicerA pigtailA punchdown block tool

117 Ralph has been hired by a client to install cabling to connect two existing networks. The two networks are in different buildings approximately 1000 feet apart. The cable type must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets their needs. Which of the following cable types best meets the needs of this client?Multimode fiber-optic cableShielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cableThin coaxial cableSingle-mode fiber-optic cable

118 Which of the following are connector types used with coaxial cables? (Choose all that apply.)BNCF-typeN-typeSTRJ-11

119 Alice has been hired by a corporation to design the cabling for their network. The corporation just moved into two different floors of an older building: a retail space on the ground floor and an office space on the 43rd floor. The building has existing Category 5 (CAT5) Unshielded Twisted Pair (UTP) cable. Alice's client wants two separate Local Area Networks (LANs), one on each of the two floors, with a backbone network connecting them. They want a 1 gigabit-per-second (Gbps) data rate for each LAN but plan on migrating to 10 Gbps in the future. The two networks are approximately 200 meters apart. Which of the following solutions best meets the client's needs?Install Category 6 (CAT6) or Category 6a (CAT6a) UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use twisted pair cable for the backbone network.Use the existing CAT5 cabling for the LANs, since CAT5 runs at 1 Gbps. Use thick coaxial cable for the backbone network.Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use multimode fiber-optic cable for the backbone network.Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use the existing CAT5 cable for the backbone network.

120 A maintenance worker, while replacing a light fixture in an office building, accidentally severs a network cable in the drop ceiling. The tenants use a variety of Local Area Network (LAN) technologies throughout the structure, but on that particular floor, there are three separate LANs: a 10-node Thin Ethernet LAN using coaxial cable in a bus topology, a 25-node Gigabit Ethernet LAN using twisted pair cable in a star topology, and a 5-node Fiber Distributed Data Interface (FDDI) LAN using multimode fiber-optic cable in a double ring topology. Without knowing which of the LANs the severed cable belongs to, what is the maximum number of computers that could be directly affected by the cable break?015102540

121 In the punchdown process for Unshielded Twisted Pair (UTP) cable, which of the following is the last step that you perform when connecting bulk cables to jacks in wall plates and patch panels?Cut off the excess wire that protrudes past the contacts.Press the bare wire down between the two metal contacts that hold it in place.Strip some of the insulating sheath off the cable end to expose the wires.Insert the wires into the appropriate contacts in the jack.Strip a small amount of insulation off each wire.Separate the twisted wire pairs at the ends.

122 Which of the following cable connector types is not used with fiber-optic cable?Straight Tip (ST)Subscriber Connector (SC)Mechanical Transfer–Registered Jack (MT-RJ)F-typeFiber Local Connector (LC)

123 Which of the following twisted pair cable types can you use to construct a 10GBase-T network with 100-meter segments? (Choose all that apply.)CAT5CAT5eCAT6CAT6aCAT7CAT8

124 Which of the following cable connector types have been rendered nearly obsolete by Universal Serial Bus (USB) connections? (Choose all that apply.)BNCRJ-11DB-9DB-25

125 Which of the following twisted pair cable types is rated for both a 10-megabit-per-second (Mbps) data rate (using two pairs) and a 100 Mbps data rate (using four pairs)?Category 3 (CAT3)Category 5 (CAT5)Category 5e (CAT5e)Category 6 (CAT6)

126 Ed has been hired to install network cabling for a small private company with 15 employees who need to share files and printers. All of the employees are physically located within the same building in two separate office spaces directly adjacent to each other, sharing a common wall and door for access. Both offices have drop ceilings. The client wants a simple Gigabit Ethernet installation that is easy to troubleshoot. In addition, Ed's client wants to keep installation costs to a minimum. Which of the following combinations of topology, cable type, and installation method would best meet the needs of Ed's client?Star topology, fiber-optic cabling, and internal installationBus topology, coaxial cabling, and external installationBus topology, twisted pair cabling, and internal installationStar topology, coaxial cabling, and external installationStar topology, twisted pair cabling, and external installation

127 Which of the following cable types are typically used in newly constructed Local Area Network (LAN) installations? (Choose all that apply.)Single-mode fiber opticMultimode fiber opticCoaxialUnshielded twisted pair

128 Which of the following statements are true about coaxial cable? (Choose all that apply.)Coaxial cable has three conductors within the same sheath.Coaxial cable has two conductors within the same sheath.Coaxial cable has a copper core that carries light pulse signals.Coaxial cable has a copper core that carries electrical signals.Coaxial cable has an insulating outer sheath made of braided strands.Coaxial cable has an insulating sheath made of either PVC or Teflon.

129 Which of the following twisted pair cable types are rated for 1000 megabit-per-second (Mbps) Gigabit Ethernet using two wire pairs? (Choose all that apply.)Category 3 (CAT3)Category 5 (CAT5)Category 5e (CAT5e)Category 6 (CAT6)Category 6a (CAT6a)None of the above

130 Which of the following twisted pair cable types support both 10-megabit-per-second (Mbps) and 100 Mbps data rates, using only two pairs? (Choose all that apply.)Category 3 (CAT3)Category 5 (CAT5)Category 5e (CAT5e)Category 6 (CAT6)

131 Which of the following statements about fiber-optic cabling are true? (Choose all that apply.)There are two main fiber-optic cable types: single-mode and multimode.Fiber-optic cable is typically used to span long distances.Fiber-optic cables use IBM Data Connector (IDC) connectors.Fiber-optic cables often use Straight Tip (ST) and Subscriber Connector (SC) connectors.Single-mode fiber-optic cable uses a laser light source and a glass core.Multimode fiber-optic cable uses a Light-Emitting Diode (LED) light source.

132 Which of the following are characteristics of an internal cable installation? (Choose all that apply.)An internal cable installation uses bulk spools of cabling with no connectors attached for most cable runs.An internal cable installation uses only prefabricated cables with connectors attached for all cable runs.An internal cable installation uses solid wire conductors for all cable runs, regardless of distance.An internal cable installation uses stranded wire conductors for short cable runs and solid core for longer cable runs.In an internal cable installation, cables are typically not run through walls or ceilings.In an internal cable installation, cables are typically run through walls or ceilings.

133 Which of the following Ethernet specifications calls for CAT8 UTP cable exclusively?10GBase-T40GBase-T100Base-TX1000Base-SX

134 Ralph has been hired to connect three Local Area Networks (LANs) together with redundant paths that form a fault-tolerant backbone. The LANs reside on different floors in the same building and are approximately 600 meters apart. Each LAN is currently configured in a star topology using twisted pair cabling. Each LAN includes wall plates and rack-mounted patch panels and switches. Building and fire codes allow cables to run through existing risers, ceilings, and walls, but a 50,000-watt radio station occupies one of the floors between the LANs. Which topology, cable type, and installation method are best suited for this network?Star topology, fiber-optic cabling, and internal installationStar topology, coaxial cabling, and external installationMesh topology, fiber-optic cabling, and external installationBus topology, twisted pair cabling, and internal installationMesh topology, fiber-optic cabling, and internal installationStar topology, twisted pair cabling, and external installation

135 Alice is a network consultant who has been contracted to evaluate a network design created many years ago, to determine if the design is still viable. The network will support 20 workstations, scattered throughout the building, to run an inventory database application. The two most distant computers are 150 meters apart. The primary goal for the network design is to connect all 20 workstations to a single LAN running at 10 megabits per second (Mbps). The two secondary goals are to provide sufficient fault tolerance for a single cable break to occur without affecting the entire network and to provide resistance to the electromagnetic interference (EMI) generated by machinery in the building. The earlier design calls for a Thin Ethernet LAN with all of the computers connected to a single coaxial cable segment. Which of the following statements about the proposal is true?The solution achieves neither the primary goal nor either of the secondary goals.The solution achieves the primary goal but neither of the secondary goals.The solution achieves the primary goal and one of the secondary goals.The solution achieves the primary goal and both of the secondary goals.

136 Ed is a network consultant who has been contracted to design the network for a new manufacturing plant. The plant consists of two buildings 150 meters apart: an office with 20 computers and a manufacturing facility that has 30 computers. The two most distant computers at the site are 225 meters apart. Ed's design calls for a Gigabit Ethernet network using fiber-optic cable. On receiving the proposal, the client asks Ed to justify the additional labor and expense of installing fiber-optic cable instead of Unshielded Twisted Pair (UTP). Which of the following is not a valid reason for choosing fiber optic over UTP for this project?The 225-meter distance between the two most distant computers exceeds Ethernet's maximum cable segment length for UTP.Only fiber-optic cable can keep the two buildings electrically isolated.Fiber-optic cable is completely resistant to any electromagnetic interference generated by the equipment in the manufacturing plant.Fiber-optic cable provides a greater degree of tolerance to cable breaks than UTP.

137 In the 100Base-TX specification, which of the following are the functions of the Fast Link Pulse (FLP) signals exchanged by switches and network interface adapters? (Choose all that apply.)The FLP signals verify the integrity of the connection (or link) between the devices.The FLP signals enable the devices to negotiate the speed of the link between them.The FLP signals indicate when a collision has occurred.The devices use FLP signals to detect bad frames.

138 Which of the following 10 Gigabit Ethernet specifications calls for the use of copper cable?10GBase-LR10GBase-CX410GBase-ER10GBase-LX410GBase-SR

139 Alice is a network consultant who has been contracted to upgrade an existing Ethernet network to Gigabit Ethernet. The network consists of 20 workstations with integrated 10Base-T/100Base-TX/1000Base-T network interface adapters. The network cabling is Category 5 (CAT5) Unshielded Twisted Pair (UTP), installed when the building was constructed. All of the workstations are connected to a single 100Base-TX switch. Which of the following options would Alice find to be a valid upgrade path to Gigabit Ethernet?Replace the CAT5 cable with at least Category 5e (CAT5e) or Category 6 (CAT6), and leave the existing network interface adapters and switch in place.Install a 1000Base-T network interface card in each computer, and leave the existing cables and switch in place.Replace the CAT5 cable with at least CAT5e or CAT6, and replace the 100Base-T switch with a 1000Base-T switch.Replace the 100Base-TX switch with a 1000Base-T switch, and leave the existing cables and network interface adapters in place.

140 Ralph is a network consultant with a client who wants him to design the Local Area Network (LAN) for his company's new branch office. The site consists of a building with Unshielded Twisted Pair (UTP) cable already installed, which the client considered a major selling point when selecting the property. He wants Ralph to install the fastest possible LAN using the existing cable. After examining the site, Ralph notes that the cable is Category 5 (CAT5), installed using a star topology, and that the individual cable runs are all less than 100 meters long. Which of the following Ethernet physical layer specifications can Ralph use for the new network to provide the fastest transmission speeds without replacing the cable?10GBase-T100Base-TX1000Base-T1000Base-LX1000Base-SX

141 Which Institute of Electrical and Electronics Engineers (IEEE) standards for Ethernet support 10-megabit-per-second (Mbps) communications, and what are the correct segment limitations for each standard? (Choose all that apply.)10Base2; segment maximum is 100 meters10Base2; segment maximum is 185 meters10Base5; segment maximum is 500 meters100Base5; segment maximum is 500 meters10Base-T; segment maximum is 100 meters10Base-T segment maximum is 328 meters

142 Which of the following are Ethernet cable types that must be configured in a bus topology? (Choose all that apply.)RG-8RG-10RG-14RG-58

143 Ed has been hired by a company to upgrade its network infrastructure. The current network is 10 Mbps Ethernet running on Category 5 (CAT5) twisted pair cable. There are 100 computers on the network, all of which have 10/100/1000 multispeed network interface adapters. The computers are all connected to hubs. Users are complaining that the network is too slow, and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations should Ed recommend to the client?Upgrade to 100Base-TX and keep the existing hubs.Upgrade to 1000Base-T and keep the existing hubs.Upgrade to 100Base-FX and replace all of the hubs with switches.Upgrade to 1000Base-T and replace all of the hubs with switches.Upgrade to 100Base-SX and replace all of the hubs with switches.

144 Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told to use the T568B pinout standard for all of the cable connectors. Ralph gathers the materials and the tools needed to complete the task, but he is not sure about the T568B pinout. Which of the following pinouts must Ralph use when creating the patch cables?White/orange, orange, white/green, blue, white/blue, green, white/brown, brownWhite/green, green, white/orange, blue, white/blue, orange, white/brown, brownWhite/orange, orange, white/green, green, white/blue, blue, white/brown, brownWhite/brown, white/green, white/orange, blue, white/blue, orange, green, brown

145 It is Ralph's first day working for a consultancy that does network cable installations. His new boss hands him a spool of Category 6 cable, a large plier-like device, and a bag of little clear plastic components and tells him to “get started on fives and tens.” What is Ralph expected to do?Pull cable runsCreate patch cablesAttach keystone connectorsInstall a patch panel

146 Wavelength division multiplexing is a fiber-optic technique for carrying multiple signals on a single network medium. There are several types of this technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is not one of the ways in which these types of multiplexing differ?They use different wavelength spacings.They carry different numbers of channels on a single medium.They provide different amounts of signal amplification.None of the above.

147 Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?DHCPNATDNSNTP

148 Which of the following best defines the concept of the dual stack?A computer with two network interface adaptersA computer with two installed operating systemsA computer with two sets of networking protocolsA computer with connections to two different network segments

149 Network Address Translation (NAT) operates at which layer of the Open Systems Interconnection (OSI) model?Data linkNetworkTransportApplication

150 Which of the following is the most accurate description of the subnetting process on an IPv4 network?You extend the IP address by adding bits for a subnet identifier.You borrow bits from the network identifier to create a subnet identifier.You borrow bits from the host identifier to create a subnet identifier.You create a subnet identifier by borrowing half of the bits from the network identifier and half from the host identifier.

151 Which of the following IPv4 addresses are you unable to assign to a network host? (Choose all that apply.)1.1.1.1229.6.87.3103.256.77.49.34.0.1

152 How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network?8151617

153 Which of the following are not valid IPv4 addresses in the private address space defined by RFC 1918? (Choose all that apply.)10.16.225.1172:33:19:7192.168.254.7710.255.255.255172.15.2.9

154 Alice has been instructed to create an IPv4 network with 8 subnets and 30 hosts per subnet. She has been assigned a Class C network address. Which of the following subnet masks will she have to use?255.255.255.128255.255.255.192255.255.255.224255.255.255.240255.255.255.248255.255.255.252

155 Which of the following is the default subnet mask for an IPv4 Class A network?255.0.0.0255.255.0.0255.255.255.0255.255.255.255

156 Which of the following is the range of IPv4 addresses that Automatic Private IP Addressing (APIPA) assigns to DHCP clients that cannot access a DHCP server?10.0.0.0 to 10.0.255.255169.254.0.0 to 169.254.255.255192.168.0.0 to 192.168.0.255224.0.0.0 to 224.0.255.255

157 In which IPv4 class is the address 127.0.0.1 found?Class AClass BClass CNone of the above

158 Which of the following is a valid IPv6 address?fe00::b491:cf79:p493:23ff2001:0:49e6:39ff:8cf5:6812:ef56fe00::c955:c944:acdd:3fcb2001:0:44ef68:23eb:99fe:72bec6:ea5f

159 To which class does the following IPv4 address belong: 190.126.14.251?Class AClass BClass CClass D

160 Classless Inter-Domain Routing (CIDR) is a standard for IPv4 addressing that includes the ability to create subnets using any number of IP address bits, rather than using 8-bit blocks. Which of the following terms describes this ability?VLSMAPIPAVLANEUI-64

161 Ralph has been instructed to use the network address 10.12.0.0/14 for the new network he is installing. What subnet mask value should he use when configuring his computers?255.248.0.0255.252.0.0255.254.0.0255.255.248.0255.255.252.0255.255.254.0

162 Ed has been hired to design a company's network. The company has an assigned Class C network address of 192.168.30.0. Ed's client wants the network to be configured with 10 subnets, each with 14 hosts. Is this configuration possible with the given address, and if so, how many subnets and hosts can Ed create on the network?Yes, this will work. By using 4 subnet bits, it is possible for Ed to create up to 16 subnets. He can then use the remaining 4 host bits to create 14 hosts on each subnet.No, this will not work. A Class C address cannot be subnetted to create 8 subnets.No, this will not work. Although there are sufficient bits available to create 10 subnets, there are not enough bits left over for Ed to create 14 hosts per subnet.Yes, this will work. Ed can create 10 subnets with 14 hosts per subnet. By using 3 subnet bits, he can create 10 subnets, which leaves 5 bits to create up to 30 hosts per subnet.

163 What is the greatest number of subnets you can create with a Class A IPv4 address if you use a 14-bit subnet identifier?2561,0221,02416,38216,384

164 Alice has been asked to design her company's Internet Protocol (IPv4) addressing scheme. The company has been assigned a Class C network address of 192.168.30.0. Alice's director wants 4 subnets with 28 hosts per subnet. How many bits are required for subnets? How many bits are required for hosts? What will the new subnet mask be for this network?3 subnet bits, 5 host bits, and subnet mask 255.255.255.2404 subnet bits, 3 host bits, and subnet mask 255.255.255.2483 subnet bits, 5 host bits, and subnet mask 255.255.255.2245 subnet bits, 3 host bits, and subnet mask 255.255.255.192

165 A network interface adapter in a workstation has a hexadecimal MAC address of 001F9EFC7AD0. Which of the following would be the adapter's IPv6 link local address based on its EUI-64 value?FE80::001F:9EFF:FEFC:7AD0FE80::FFFE:021F:9EFC:7AD0FE80::FF00:1F9E:FC7A:D0FEFE80::021F:9EFF:FEFC:7AD0

166 The default mask for a IPv4 Class B network is 255.255.0.0. How many subnet bits do you need to create 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?10 subnet bits with a subnet mask of 255.255.255.1929 subnet bits with a subnet mask of 255.255.255.12810 subnet bits with a subnet mask of 255.255.224.011 subnet bits with a subnet mask of 255.255.255.192

167 What is the greatest number of host addresses you can create on a single subnet of a network with the following address: 172.16.0.0/20?1421444,0944,096

168 Ralph has an IPv4 Class B network with a subnet mask of 255.255.248.0. How many subnets can he create, and how many hosts can he create per subnet?64 subnets and 2046 hosts32 subnets and 2046 hosts30 subnets and 1022 hosts62 subnets and 1022 hosts

169 Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?255.255.224.0255.255.240.0255.255.248.0255.255.252.0

170 If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?192.168.1.33 through 192.168.1.63192.168.1.33 through 192.168.1.62192.168.1.34 through 192.168.1.62192.168.1.34 through 192.168.1.63

171 Alice has been assigned the IPv4 network address 172.21.0.0/22 for the creation of a new department network in her company. How many host addresses does she have available to her?51051210221024

172 Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?Class AClass BClass CClass D

173 Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?Class AClass BClass CClass DClass E

174 Which of the following is an address that you can assign to a host on a private IPv4 network?192.167.9.46172.16.255.25510.1.0.253225.87.34.1

175 Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?255.255.224.0255.255.240.0255.255.248.0255.255.255.224255.255.255.240

176 Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?192.168.2.32 to 192.168.2.55192.168.2.33 to 192.168.2.46192.168.2.33 to 192.168.2.40192.168.2.1 to 192.168.2.254

177 Which of the following IPv4 addresses is available for use on a network device?1.0.0.1127.98.127.0234.9.76.32240.65.8.124

178 Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?Link localGlobal unicastSite localAnycast

179 When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply.)A unique port numberA common public IPv4 addressA common port numberA unique public IPv4 address

180 Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?EUI-64SLAACAPIPAv6DHCPv6

181 Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply.)TeredoIPsecICMPv66to4

182 Which of the following best describes why IPv6 hosts exchange ICMPv6 Router Solicitation and Router Advertisement messages with routers?To obtain the prefix needed to generate a link-local addressTo learn the IPv6 address of the nearest routerTo perform address conflict detection for its link-local addressTo encapsulate IPv4 packets and transmit them over the router

183 Which of the following are examples of Virtual IP (VIP) addresses? (Select all that apply.)An IP address assigned to a host workstation by a DHCP serverA public IP address substituted for a host's own private IP address by a NAT routerAn IP address assigned to a host workstation by APIPAAn IP address assigned to a virtual NIC

184 Which of the following is the best definition of a subinterface?A logical network interface created from a physical network interfaceOne of the ports on a physical network interface adapter with multiple portsA physical network interface connected to a subnetOne of the IP addresses associated with a network interface that has multiple IP addresses

185 Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?110 and 25143 and 25110 and 14380 and 11025 and 80

186 Which of the following server applications use two well-known port numbers during a typical transaction?NTPSNMPHTTPFTP

187 Which of the following protocols does the Ping utility use to exchange messages with another system?UDPTCPICMPIGMP

188 Which of the following components does the port number in a transport layer protocol header identify?A transport layer protocolAn applicationA gatewayA proxy server

189 Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?Institute for Electronic and Electrical Engineers (IEEE)Internet Assigned Numbers Authority (IANA)Internet Engineering Task Force (IETF)International Organization for Standardization (ISO)

190 Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?222080443

191 The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?2580110443

192 What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?MSSWindowMMSWinMS

193 What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?SocketOUIWell-known portNetwork addressDomain

194 Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)ICMPIGMPSMTPSNMP

195 Which of the following protocols is used to exchange directory service information?RDPLDAPSNMPSMB

196 Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)11025587993995

197 Which of the following is not a port number used for Structured Query Language (SQL) communications?1433152133063389

198 Which of the following port numbers is assigned to a Unix logging services program?389514636993

199 Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?HTTPHTMLSMTPFTP

200 Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?DHCPBOOTPDNSSNMP

201 Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)EthernetIPTCPUDP

202 What is the native file sharing protocol used on all Microsoft Windows operating systems?Hypertext Transfer Protocol (HTTP)Network File System (NFS)File Transfer Protocol (FTP)Server Message Block (SMB)Lightweight Directory Access Protocol (LDAP)

203 When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?ACKFINPSHSYNURG

204 Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?SynchronizationInitialization exchangeConnection establishmentThree-way handshake

205 Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)6566676869

206 Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?The port number indicates to the receiver that the sender can activate a specific port only.The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.The port number is used only by the receiver, to indicate the application process running on the sender.The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes.

207 What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?1023 through 655341 through 102449152 through 655351024 to 49151

208 Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all that apply.)UDP does not use packet sequencing and acknowledgments.UDP uses packet sequencing and acknowledgments.UDP is a connection-oriented protocol.UDP is a connectionless protocol.UDP has an 8-byte header.UDP has a 20-byte header.

209 Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all that apply.)2123205369

210 Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?TCPHTTPUDPARP

211 What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?1024 through 491511 through 4915149152 through 655341 through 1023

212 Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user's mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which of the following new protocols should Ralph expect to see in his network traffic analysis? (Choose all that apply.)SNMPSMTPPOP3IMAPRIP

213 Which of the following values could a web client use as an ephemeral port number when communicating with a web server?123801024199950134

214 Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?TCPHTTPUDPIP

215 Which of the following protocols is limited to use on the local subnet only?Address Resolution Protocol (ARP)Dynamic Host Configuration Protocol (DHCP)Domain Name System (DNS)Simple Mail Transfer Protocol (SMTP)

216 Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?TLS://HTTPS://HTTP://HTLS://

217 What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://? (Choose all that apply.)The connection between the web browser and the server is encrypted.The browser uses a different port number to connect to the server.The connection uses SSL or TLS instead of HTTP.The browser uses a different IP address to connect to the server.

218 You are a consultant installing a web server application for a client called Adatum. The domain name Adatum.com has been registered in the DNS, and the server has one public IP address, so the new website will be accessible to users on the Internet. You want to be able to access the web server application's administrative site from your remote office, so you configure that site to be encrypted and to use the port number 12354 instead of the default. Which of the following URLs will you have to use to access the administrative website?http://www.adatum.comhttp://www.adatum.com:12354https://www.adatum.com:80https://www.adatum.com:12354

219 Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?ESPSSLAHMSCHAP

220 Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all that apply.)SSHAHESPSSL

221 What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?Lack of securitySlow file transfersFile size limitationsLack of authentication

222 Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?FTPFTPSSFTPTFTP

223 Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?FTPFTPSSFTPTFTP

224 Which of the following protocols does IPsec use to digitally sign packets before transmitting them over the network?ESPSSLAHMSCHAP

225 Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?SSLTLSSSHDTLS

226 Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?SSHSSLRDPIPsec

227 In which of the following DNS transactions does the querying system generate a recursive query? (Choose all that apply.)A DNS client sends the server name www.adatum.com from a URL to its designated DNS server for resolution.A client's DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.A client's DNS server sends a request to the com top-level domain server to find the authoritative server for the adatum.com domain.A client's DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP's DNS server for resolution.A client's DNS server sends a request to the adatum.com domain server to find the IP address associated with the server name www.

228 Which of the following devices would you most likely configure to function as a Dynamic Host Configuration Protocol (DHCP) server?A wireless routerAn unmanaged switchA hubA bridge

229 Which of the following protocols are responsible for assigning IP addresses to hosts? (Choose all that apply.)Dynamic Host Configuration Protocol (DHCP)Address Resolution Protocol (ARP)Domain Name System (DNS)File Transfer Protocol (FTP)Bootstrap Protocol (BOOTP)

230 Which of the following Domain Name System (DNS) resource records is used only for reverse name resolution?MXAAAACNAMEPTR

231 Which of the following features is supported by DHCP, but not by BOOTP and RARP?Dynamic address allocationRelay agentsManual address allocationAutomatic address allocation

232 Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address allocation transaction? (Choose all that apply.)DHCPDISCOVERDHCPOFFERDHCPINFORMDHCPACKDHCPREQUESTDHCPNAKDHCPRENEWDHCPRELEASE

233 Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address lease renewal transaction? (Choose all that apply.)DHCPDISCOVERDHCPOFFERDHCPINFORMDHCPACKDHCPREQUESTDHCPNAKDHCPRENEWDHCPRELEASE

234 Which of the following is not a protocol used to allocate IP address assignments to clients on a network?ARPRARPBOOTPDHCP

235 Which of the following best describes what happens when a DNS server receives an iterative name resolution query?The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing that, with an error message stating that it could not resolve the requested name.The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by issuing its own iterative queries to other DNS servers.The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by forwarding the name resolution request to another DNS server in a recursive query.The DNS server responds immediately if it is the authoritative server for the domain in which the requested name is located. Otherwise, it returns an error message stating that it could not resolve the requested name.

236 What is the term used to refer to the DNS client mechanism that generates name resolution queries and sends them to DNS servers?RequestorForwarderAuthorityResolver

237 Which of the following TCP/IP parameters, configured on an end system, specifies the IP address of a device that performs domain name resolution services?WINS Server AddressesDefault GatewayDNS Server AddressesSubnet Gateway

238 Which IP address allocation method is not supported by Dynamic Host Configuration Protocol (DHCP)?ManualDynamicStableAutomatic

239 On a Dynamic Host Configuration Protocol (DHCP) server, what is the name of the element you create to specify which IP addresses the server should assign to clients?RangeScopePoolSubnet

240 Why is it necessary to use a relay agent to enable a Dynamic Host Configuration Protocol (DHCP) server to assign IP addresses to clients on other networks? (Choose all that apply.)Because DHCP requires a separate license for each subnet.Because clients cannot initiate an address assignment by contacting DHCP servers on other networks directly.Because DHCP must use the Transmission Control Protocol (TCP) to communicate with clients.Because the DHCP address assignment process relies on broadcast transmissions.

241 Which of the following Domain Name System (DNS) resource records is used to resolve a hostname into an IPv6 address?MXPTRAAAACNAME

242 Ralph has configured a server called NE6 to function as a web server. He does not want to change the server's existing name, but he wants it to also be accessible to clients using the name www . What Domain Name System (DNS) modification can Ralph make to accomplish this?Create an additional A resource record.Create a new CNAME resource record.Modify the existing A resource record.Create a new PTR resource record.

243 Which of the following options should you configure on a Dynamic Host Configuration Protocol (DHCP) server to supply clients with a default gateway address?RouterTime ServerName ServerLPR Server

244 Dynamic Host Configuration Protocol (DHCP) clients rely on which of the following types of transmissions to locate and initiate contact with DHCP servers on the local network?UnicastBroadcastMulticastAnycast

245 Which of the following Domain Name System (DNS) resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?NSPTRMXSRVSOATXT

246 Which of the following must you create on a DHCP server if you want it to always assign the same IP address to a particular computer?ExclusionScopeReservationRelay

247 Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?AutomaticDynamicManualStatic

248 Which of the following technologies enables the IP addresses assigned to clients by a Dynamic Host Configuration Protocol (DHCP) server to be automatically added to the DNS namespace?Reverse name resolutionDynamic DNSAutomatic allocationHOSTS

249 Which of the following is a tool that integrates DHCP and DNS so that each is aware of the changes made by the other?HOSTSDHCPv6IPAMAPIPA

250 Which of the following is the term used to describe the logical distance of a Network Time Protocol (NTP) server from the time source to which it is synchronized?LayerPathIterationStratum

251 Which of the following protocols is used to synchronize computer clocks to a time signal provided by a server?TFTPHTTPSMTPNTP

252 Which of the words in the fully qualified domain name (FQDN) www.paris.mydomain.org represents the topmost layer in the DNS namespace hierarchy?wwwparismydomainorg

253 Which of the following Dynamic Host Configuration Protocol (DHCP) options prevents the client from transmitting IP datagrams that circulate endlessly around the network?Interface MTUDefault IP TTLARP cache timeoutTCP keepalive interval

254 In designing a network for a client, Ed has decided to use both internal and external DNS servers. Which of the following resources should Ed register with the external DNS server? (Choose all that apply.)Company database serversInternet web serversIncoming email serversDomain controllers

255 Ralph is concerned that the IP address scope of available leases on his DHCP server is nearly exhausted. What happens to DHCP clients when there are no IP addresses left in the scope for assignment?Clients are assigned a 0.0.0.0 address.Clients self-assign APIPA addresses.Client DHCP requests are forwarded to another DHCP server.Clients are forced to share IP addresses.

256 Alice is the administrator of a subnet for which she has been allotted 100 IP addresses. She has installed a DHCP server with a scope containing all 100 available addresses for lease. There are currently 99 clients configured to use the DHCP server, many of which are mobile devices, and Alice fears that systems frequently leaving and rejoining the network might cause the scope of available leases to be exhausted. Which of the following adjustments can help to prevent this from happening?Increase the lease time for the scope.Decrease the lease time for the scope.Install a second DHCP server.Create a second scope for the subnet.

257 DHCP clients use broadcast messages to contact a DHCP server on the local subnet. Which of the following are mechanisms by which DHCP broadcast messages can be forwarded to a DHCP server on another subnet when there is none on the local subnet? (Choose all that apply.)DHCP relayUDP forwardingZone transferIP helper

258 Which of the following mechanisms enables administrators to maintain current DNS database information on multiple name servers, for fault tolerance and load balancing purposes?Multi-master replicationUDP forwardingIterative queryZone transfer

259 Which of the following Storage Area Network (SAN) protocols are capable of sharing a network medium with standard Local Area Network (LAN) traffic? (Choose all that apply.)iSCSIFibre ChannelFCoEInfiniBand

260 Which of the following protocols is not used for Storage Area Networks (SANs)?iSCSIFCoEVoIPFibre Channel

261 Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?Active DirectoryICMPDNSiWINSiSNS

262 What is the highest possible data transfer rate on a Storage Area Network (SAN) using Fibre Channel?8 Gbps16 Gbps32 Gbps128 Gbps256 Gbps

263 In its primary functionality, a network attached storage (NAS) device is most closely associated with which of the following devices?Failover clusterFile serverJBODRAID

264 Which of the following statements about the differences between Network Attached Storage (NAS) and Storage Area Networks (SANs) are true? (Choose all that apply.)NAS provides file-level storage access, whereas SAN provides block-level storage access.NAS devices typically contain integrated iSCSI targets.SAN devices have an operating system, whereas NAS devices do not.NAS devices typically provide a filesystem, whereas SAN devices do not.

265 Which of the following statements specify advantages of FCoE over the original Fibre Channel standard? (Choose all that apply.)FCoE is less expensive to implement than Fibre Channel.FCoE can share a network with standard IP traffic, whereas Fibre Channel cannot.FCoE is routable over IP networks, whereas Fibre Channel is not.FCoE uses standard Ethernet networking hardware.

266 Which of the following are application layer protocols that Network Attached Storage (NAS) devices can use to serve shared files to clients on the network? (Choose all that apply.)CIFSNFSRDMAHTTP

267 Which of the following is not one of the advantages of iSCSI over Fibre Channel? (Choose all that apply.)iSCSI is routable, whereas Fibre Channel is not.iSCSI is less expensive to implement than Fibre Channel.iSCSI includes its own internal flow control mechanism, whereas Fibre Channel does not.iSCSI can share the same network as standard local area network traffic, whereas Fibre Channel cannot.

268 Which of the following Storage Area Network (SAN) technologies is primarily used by supercomputers as a high-speed, low-latency connection between Central Processing Units (CPUs) and storage systems?InfiniBandFibre ChanneliSCSIFCoE

269 Which of the following is the term for the client that accesses an iSCSI device on a storage area network?InitiatorTargetControllerAdapter

270 Which of the following protocols are included in an iSCSI packet? (Choose all that apply.)EthernetIPTCPUDPNone of the above

271 Which of the following protocols are included in a Fibre Channel packet?EthernetIPTCPUDPNone of the above

272 Which of the following protocol standards defines a layered implementation that does not correspond to the layers of the Open Systems Interconnection (OSI) model?iSCSIFibre ChannelPPPRDMA

273 Which of the following protocols are included in an FCoE packet?EthernetIPTCPUDPNone of the above

274 Which of the following protocols uses jumbo frames to increase performance levels on storage area networks?EthernetIPFibre ChanneliSCSI

275 Which of the following is not the name of one of the layers in the three-tier datacenter architecture?CoreIntermediateDistributionAccess

276 Which of the following is not a reason why the leaf and spine datacenter topology is superior to the standard three-tier topology?The leaf and spine arrangement uses a full mesh switching topology.In a leaf and spine topology, all data flows require the same number of hops.The leaf and spine topology is less expensive to implement than the three-tier topology.The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.

277 Which of the following best describes the difference between east-west and north-south traffic in a datacenter?East-west describes traffic between devices at the same layer of the OSI model, while north-south describes traffic between OSI model layers.East-west is switch-to-switch traffic, while north-south is switch-to-router traffic.East-west traffic stays within the datacenter, while north-south traffic does not.East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.

278 Top-of-rack switches most commonly form which layer of the datacenter topology?LeafBackboneSpineCore

279 Which of the following layers in a Software-Defined Network (SDN) architecture consists of hardware devices?ApplicationControlInfrastructureCore

280 In a Software Defined Network (SDN), as defined in the RFC 7426 specification, a plane is a set of resources related to a particular function. Which of the following is not one of the five planes defined in the SDN architecture?ForwardingOperationalControlManagementInfrastructureApplication

281 Ralph is designing the datacenter for his company's new branch office. He is considering various options, including building a new datacenter at the branch office facility, using a colocated datacenter, and creating a virtual datacenter using a public cloud provider. Which of the following statements about the differences between these options are true? (Choose all that apply.)A colocated datacenter would be less expensive to implement than a branch office or public cloud datacenter.In a branch office or colocated datacenter, Ralph's company would own the hardware.In all three datacenter options, the administrators in Ralph's company would be responsible for setting up and managing the hardware.In a branch office or colocated datacenter, Ralph's company would be responsible for all utility costs, including heating, cooling, and power.A public cloud datacenter would have greater physical security than the other two options.A public cloud datacenter is easier to expand than a colocated or branch office datacenter

282 Which of the following cloud service models enables you to perform a new installation of an operating system of your choice?IaaSPaaSSaaSDaaSAll of the above

283 When you contract with a provider to obtain email services for your company using their servers in the public cloud, which of the following service models are you using?IaaSPaaSSaaSDaaSNone of the above

284 Which of the following cloud service models provides the consumer with the most control over the cloud resources?IaaSPaaSSaaSDaaSIaaS, PaaS, SaaS, and DaaS all provide the same degree of control.

285 Alice has just created a new Windows Server 2016 virtual machine using remote controls provided by a cloud service provider on the Internet. Which of the following cloud architectures is she using? (Choose all that apply.)IaaSPaaSSaaSPublic cloudPrivate cloudHybrid cloudCommunity cloud

286 In which of the following cloud models can a single organization function as both the provider and the consumer of all cloud services?Public cloudPrivate cloudHybrid cloudAd hoc cloud

287 Ed is the overnight manager of his company's datacenter, and he is responsible for both private and public resources in the company's hybrid cloud. Due to a new TV commercial shown that night, the company's website experiences a massive upsurge in traffic. The web server farm on the private cloud is being overwhelmed, so Ed configures some virtual machines in the public cloud to take up the slack. Which of the following is a common term for what Ed has done?Cloud bustingCloud burstingCloud splittingCloud migrating

288 Microsoft's Outlook.com email service is an example of which of the following cloud service models?IaaSPaaSSaaSDaaSNone of the above

289 Which of the following statements about cloud delivery models is true?A public cloud is inherently insecure because anyone can access it.A private cloud consists of hardware that is all located in a single datacenter.A hybrid cloud enables administrators to migrate services between public and private resources.Public, private, and hybrid clouds all utilize the same hardware resources.

290 Ed has just created a new Windows application for his company, and he wants to deploy it in the public cloud. He is looking for a provider that will furnish his company with a fully installed and configured Windows server on which he can install and run his application. Which of the following service models is he seeking to use?IaaSPaaSSaaSDaaSNone of the above

291 Which of the following are valid advantages or disadvantages of multitenancy in a public cloud datacenter? (Choose all that apply.)Multitenancy presents a potential security risk because other tenants are utilizing the same hardware.Multitenancy reduces the cost of utilities and other overhead.Multitenancy introduces the possibility of competition for bandwidth with other tenants.Multitenancy separates tenants by assigning each one its own virtual machine.

292 Which of the following is not one of the advantages of Infrastructure as Code (IaC) deployment for cloud-based virtual machines?IaC provides rapid deployment of virtual machine configurations.IaC provides consistency in virtual machine configurations.IaC provides cost savings by automating the virtual machine configuration process.IaC provides increased security by encrypting the virtual machine configurationIaC provides elasticity and scalability by simplifying the virtual machine deployment process.

293 Ralph is designing a hybrid deployment for a corporate client that will require a connection between the client's private network and a public cloud provider. The client is concerned about this connection becoming a speed bottleneck at times of heavy user traffic. Which of the following options can Ralph offer the client that will best address this potential problem?Use a different ISP for the cloud connection.Use a VPN for the cloud connection.Use a cloud direct connection for the hybrid link.Use a leased line connection to the ISP

CompTIA Network+ Practice Tests

Подняться наверх