0% found this document useful (0 votes)
128 views30 pages

Assessment 4 - Attempt Review

IRM4721 assignment 4 answers

Uploaded by

Precious
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views30 pages

Assessment 4 - Attempt Review

IRM4721 assignment 4 answers

Uploaded by

Precious
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

IRM4721-24-Y  Welcome Message  Assessment 4

QUIZ

Started on Wednesday, 10 July


2024, 7:27 PM
State Finished
Completed on Wednesday, 10 July
2024, 8:03 PM
Time taken 36 mins 16 secs
Grade 49.00 out of 50.00
(98%)

Question 1

Correct

Mark 1.00 out of 1.00

1. Which one of the following statements


regarding network models is TRUE?

a. Physical topologies mostly refer


to how software controls access
to network resources.
b. In a peer-to-peer network 
model, each computer
controls its own
administration, resources,
and security.
c. In a general scenario, if a
network supports fewer than 15
computers, a client-server
network model is the way to go.
d. Logical topologies mostly refer
to how computers work together
with radio signals and other
devices to form the physical
network.

The correct answer is: In a peer-to-peer


network model, each computer controls
its own administration, resources, and
security.
Question 2

Correct

Mark 1.00 out of 1.00

2. James, a supporting technician, is


trying to resolve an issue pertaining to
the router. On inspecting the issue, he
figured that the router was unable to
move packages from one node to
another. As a resolution to this problem,
he intends to follow the OSI (Open
Systems Interconnection) model for
troubleshooting. What layer of the OSI
model should he inspect to understand
the issue relating to the router?

a. The Physical Layer.


b. The Session Layer.
c. The Transport Layer.
d. The Network Layer. 

The correct answer is: The Network


Layer.

Question 3
Correct

Mark 1.00 out of 1.00

3. The PDU (Protocol Data Unit) for the


Data Link Layer of the OSI (Open
Systems Interconnection) model is
a ________.

a. Packet or L3PDU (Technical


name)

b. Frame or L2PDU (Technical 


name)

c. Bit or L1PDU (Technical name)

d. Payload or L7PDU (Technical


name)

The correct answer is: Frame or L2PDU


(Technical name)
Question 4

Correct

Mark 1.00 out of 1.00

4. You have successfully implemented a


solution to a bug reported by one of the
employees of your organization. You also
want to ensure that the process has been
well documented in the knowledge base
of the organization. Which one of the
following information is NOT relevant in
such a scenario when you put the data
into the record books?

a. The contact name of the person


reporting the issue.
b. The symptoms of the problem.
c. The name of the technician who
handled the problem.
d. The total number of 
computers functioning in
the organization.

The correct answer is: The total number


of computers functioning in the
organization.
Question 5

Correct

Mark 1.00 out of 1.00

5. The University of Mordor houses


almost 1000 students in its campus. It
has multiple buildings in the campus
where free food and Internet services are
provided for the students. The University
boasts of providing one of the fastest
Internet experiences in the country and
there have never been any reports of the
service going down. To ensure such
efficient connectivity, the University
adheres to the ANSI/TIA standards to
better manage the data feed from the
main data facilities. Which one of the
following can be reasonably inferred
from the above scenario?

a. There are multiple MDFs (Main


Distribution Frames) in every
building.
b. The network setup used to
connect the central network to
other nodes is organized in a
star topology.
c. Every floor in the building 
has an individual IDF
(Intermediate Distribution
Frame).
d. The cable sheath used to
provide the connection is
plenum-rated.

The correct answer is: Every floor in the


building has an individual IDF
(Intermediate Distribution Frame).
Question 6

Correct

Mark 1.00 out of 1.00

6. A client contacted you to avail your


services for cable installation. The
requirement is to set up a connection
which connects workstations to the data
room, and the distance between the
workstation and the data room spans 87
meters. Which cabling installation would
be an ideal option for this assignment?

a. Vertical cabling
b. Horizontal cabling 
c. Backbone cabling
d. Patch cabling

The correct answer is: Horizontal cabling

Question 7
Correct

Mark 1.00 out of 1.00

7. If a twisted-pair cable has a diameter


of 0.8 cm, which of the following options
would you apply as the bend radius of the
cable so that data transmission is not
impaired?

a. 2.4 cm
b. 1.6 cm
c. 3.2 cm 
d. 3 cm

The correct answer is: 3.2 cm


Question 8

Correct

Mark 1.00 out of 1.00

8. When Kyle visited Claremont Group of


Institutions as a network professional to
repair defective cable ends, he accidently
left more than an inch of exposed cable
before a twisted-pair termination. What
will the consequence of Kyle's error be?

a. It will increase the possibility of


noise interference, which will
affect the network's signals.
b. It will risk connectivity and data
transmission problems.
c. It will increase the 
possibility of transmission
interference between wires,
a phenomenon called
crosstalk.
d. It will make it difficult to
diagnose data errors.

The correct answer is: It will increase the


possibility of transmission interference
between wires, a phenomenon called
crosstalk.

Question 9

Correct

Mark 1.00 out of 1.00

9. Wilson Stationers has called you to its


office space to troubleshoot an error
wherein there is an issue with outgoing
email messages because of which the
logistics are getting delayed. Which one
of the following ports would you
troubleshoot to sort out this issue?

a. 21
b. 23
c. 53
d. 25 

The correct answer is: 25


Question 10

Correct

Mark 1.00 out of 1.00

10. The Mosiac Music School has hired


Kirk to set up a SIP (Session Initiation
Protocol) protocol for a collaborative
multimedia conference session that will
be limited to the selected students opting
for music theory. Which port should he
use in such a situation so that the
required encryption can be provided?

a. 993
b. 5060
c. 995
d. 5061 

The correct answer is: 5061

Question 11
Incorrect

Mark 0.00 out of 1.00

11. Your client has contacted you to


examine a workstation that has been
showing network fluctuations time and
again. The client tells you that one of his
employees might have spilled some hot
water over the Ethernet ports. Which one
of the following addresses will you
choose to check the functionality of the
Ethernet card without worrying about
corrupted hardware and to ensure that
the workstation's TCP/IP (Transmission
Control Protocol/Internet Protocol)
services are running?

a. ping 192.168.1.1
b. ping 127.0.0.1
c. ping -a 8.8.8.8 
d. ping -?

The correct answer is: ping 127.0.0.1


Question 12

Correct

Mark 1.00 out of 1.00

12. On a Linux-based system, which


command can be used to display TCP/IP
(Transmission Control Protocol/Internet
Protocol) information associated with
every interface on a Linux device?

a. ifconfig
b. ifconfig -a 
c. sudo ifconfig eth0 down
d. man ifconfig

The correct answer is: ifconfig -a

Question 13
Correct

Mark 1.00 out of 1.00

13. Mr. Yoda is a network engineer who


has been working on setting up a data
delivery service. While creating the TCP
(Transmission Control Protocol) segment
for this purpose, the network
administrator has requested Mr. Yoda to
set up a command requesting a
synchronization of the sequence
numbers between two nodes so that it
can indicate to the receiving node that
there is no payload attached to the data
packet. Which one of the following
statements will best fit the situation for
Mr. Yoda?

a. Set the SYN to 1 byte in the 


flag segment of the TCP
segment.
b. Set the FIN to 1 byte in the flag
segment of the TCP segment.
c. Set the RST to 1 byte in the flag
segment of the TCP segment.
d. Set the PSH to 1 byte in the flag
segment of the TCP segment.

The correct answer is: Set the SYN to 1


byte in the flag segment of the TCP
segment.
Question 14

Correct

Mark 1.00 out of 1.00

14. Barney is the owner of Venture


Capitals Internet Solutions. Venture's
client Riverdale Union High has many
remote users, who are school students,
and they regularly need access to
desktops. The school wants to offer a
consistent desktop experience with
installed applications that the students
commonly need. However, they do not
want to purchase several physical
computers for these students to connect
to. What should Barney do in such a
scenario?

a. Barney should use VDI 


(Virtual Desktop
Infrastructure).
b. Barney should use RDP (Remote
Desktop Protocol).
c. Barney should use SSH (Secure
Shell).
d. Barney should use Telnet.

The correct answer is: Barney should use


VDI (Virtual Desktop Infrastructure).

Question 15
Correct

Mark 1.00 out of 1.00

15. Jason is an employee working for


Deloitte Corporation. He has been
allowed to work from home because of
the COVID-19 outbreak. You have been
asked to establish a VPN (Virtual Private
Network) so that Jason can access a file
server from the office while he operates
from his workstation at home. It also
must be kept in mind that Jason wants to
stream music alongside when he does
this. Which approach to VPN tunneling
will you apply so that the necessary
requirements are met?

a. Split tunnel VPN 


b. Site-to-site VPN
c. Host-to-host VPN
d. Full tunnel

The correct answer is: Split tunnel VPN


Question 16

Correct

Mark 1.00 out of 1.00

16. Mr. Yen has been working as a


network technician for Goldyear Tyres.
Recently, a couple of routers were
reported for hardware failure. As the
organization is large, it will take a lot of
time to track down and identify the
malfunctioning routers. What would be
the most feasible option for Mr. Yen in
this situation to solve the issue?

a. Use traceroute or tracert to track


down the malfunctioning
routers.
b. Use ping to test for network
connectivity.
c. Use tracert to target a node 
instead of the router.
d. Use Mac spoofing.

The correct answer is: Use tracert to


target a node instead of the router.

Question 17
Correct

Mark 1.00 out of 1.00

17. You are setting up a network


connection that can transmit up to 10
Gbps with a maximum frequency of 500
MHz. However, you do not want to
disrupt the previous cabling equipment
as it will increase the cost. Which
TIA/EIA 568 standard twisted-pair
cabling standard will you use to carry out
this operation without having to go
through the equipment changes?

a. Cat 5 (Category 5)
b. Cat 6a (Augmented 
Category 6)
c. Cat 6 (Category 6)
d. Cat 5e (Enhanced Category 5)

The correct answer is: Cat 6a


(Augmented Category 6)
Question 18

Correct

Mark 1.00 out of 1.00

18. Which pin number would you


associate a white/orange T568A colour
Fast Ethernet function?

a. 1
b. 3 
c. 5
d. 7

The correct answer is: 3

Question 19

Correct

Mark 1.00 out of 1.00

19. Josh is a new trainee at TT&P who


has been sent to a client location to
patch up cables connecting the switch to
the data center. While doing so, Josh is
unable to decide which connector to
consider while connecting the ferrules of
an SMF (Single Mode Fiber) cable that
measures 1.25 mm. Which one of the
following connectors should Josh opt for
under the circumstances so that there
are minimum back reflections?

a. LC (Local connector) 
b. ST (Straight Tip)
c. MT-RJ (Mechanical Transfer -
Registered Jack)
d. SC (Subscriber Connector)

The correct answer is: LC (Local


connector)
Question 20

Correct

Mark 1.00 out of 1.00

20. Mr. Chadwick has recently set up a


network connection for a client wherein
he made a connection between an SMF
(Single Mode Fiber) and an MMF
(Multimode Fiber) cable using a fusion
splicer. Around a week later, the client
calls him up and raises a concern about
fluctuations in the network. Mr. Chadwick
decides to conduct an on-site inspection,
and he gets to know that the reason
behind the fluctuation is that the
transmission has not traversed
successfully. Which common fiber
problem is Mr. Chadwick referring to in
this case?

a. Dirty connectors
b. Wavelength mismatch
c. Link loss
d. Fiber type mismatch 

The correct answer is: Fiber type


mismatch

Question 21
Correct

Mark 1.00 out of 1.00

21. DMPL wants to establish a one-stop


shopping point for consumers. DMPL
has contracted you to develop a single
card that can be used for loyalty and
membership programs as well as for
cashless payments. The management at
DMPL has specified that the card should
not include a power source and should
be able to transfer data wirelessly over
short distances up to 10 cm. Which one
of the following technologies will you
use?

a. RFID (Radio Frequency


Identification)
b. ANT +
c. ZigBee
d. NFC (Near-Field 
Communication)

The correct answer is: NFC (Near-Field


Communication)
Question 22

Correct

Mark 1.00 out of 1.00

22. Tim has been contracted to install a


wireless connection at the head office of
Travis Roadways. The head office is
located in between two manufacturing
units because of which there is a lot of
noise in the wireless spectrum. The
management has requested Tim to
ensure that the network connection
provides reliable delivery of time-
sensitive data so that they can conduct
meetings with other branch divisions via
video streaming. What is the RSSI
(Received Signal Strength Indicator) level
required for Tim to establish the
connection functional as per the
requirements?

a. The RSSI level should at least be


-80 dBm.
b. The RSSI level should at least be
-90 dBm.
c. The RSSI level should at 
least be -50 dBm.
d. The RSSI level should at least be
-70 dBm.

The correct answer is: The RSSI level


should at least be -50 dBm.
Question 23

Correct

Mark 1.00 out of 1.00

23. Yours Eventfully is a talent


acquisition firm that wants to install
biometric methods such as hand
scanning at its office for which you have
been contracted. Your job as a network
engineer is to create an encrypted TLS
(Transport Layer Security) tunnel
between the supplicant and the server
before proceeding with the usual EAP
(Extensible Authentication Protocol)
process. Which of the following versions
of EAP will you use in this scenario?

a. PEAP (Protected EAP) 


b. EAP-TLS
c. EAP-FAST (EAP-Flexible
Authentication via Secure
Tunneling)
d. EAP-MSCHAPv2

The correct answer is: PEAP (Protected


EAP)
Question 24

Correct

Mark 1.00 out of 1.00

24. Local Dreams is a small cafe


operating in New York. It has set up a
free wireless network in its cafe to
provide customers with ease of Internet
access. Recently, one of the customers
lodged a complaint against Local
Dreams regarding data theft from his
emails, which has been traced back to
the cafe's public IP. Local Dreams has
informed Barton, who is the network
provider for the cafe, to rectify the issue.
Which one of the following should Barton
do to rectify the issue?

a. He should check for guest


network preferences.
b. He should check if the antenna
has been misplaced.
c. He should check whether 
captive portal user
reminders have been set up.
d. He should check whether the
geofencing security option has
been enabled.

The correct answer is: He should check


whether captive portal user reminders
have been set up.
Question 25

Correct

Mark 1.00 out of 1.00

25. Michael Slater is the new technician


in the office. An issue has reduced the
performance of the network, but he is
unable to diagnose the reason behind the
issue. On checking the recommended
geographic range for the AP (Access
Point), he realizes that the clients are not
within the recommended distance. This
has caused multiple data errors and a
deterioration in communication. Which
one of the following issues has caused
the issue here?

a. Interference
b. Channel overlap
c. Insufficient wireless 
coverage
d. Simultaneous wired and wireless
connections

The correct answer is: Insufficient


wireless coverage
Question 26

Correct

Mark 1.00 out of 1.00

26. For over a decade, Ramanathan has


been working as a network engineer in an
organization that uses FC (Fibre Channel)
networking architecture. His primary duty
is to ensure that there are no issues in
the network connections between
servers and SAN (Storage Area Network)
devices, so that maximum throughput is
always achieved. Recently, one of the
connections of the FC device to the
network malfunctioned, which
Ramanathan must fix. Which one of the
following should Ramanathan do in this
scenario?

a. Use NICs (Network Interface


Cards) to connect the FC
devices to the network
b. Connect the FC devices to 
the network through HBAs
(Host Bus Adapters)
c. Install CNAs (Converged
Network Adapters) to connect to
network servers
d. Use the iSCSI (Internet SCSI)
protocol

The correct answer is: Connect the FC


devices to the network through HBAs
(Host Bus Adapters)
Question 27

Correct

Mark 1.00 out of 1.00

27. As a developer, you need frequent


access to multiple platforms during the
development process. Rather than
purchasing and maintaining a separate
device for each platform, you have
decided to avail the cloud service option.
You are looking to build and test the
applications within these virtual, online
environments, which are tailored to the
specific needs of the project. The cloud
service model should have servers that
provide only the resources needed to run
an application and allow customers to
run their code directly in the cloud
without having to manage a server
environment at all. Which one of the
following cloud service models do you
think would be appropriate considering
your requirements?

a. IaaS (Infrastructure as a Service)


b. PaaS (Platform as a Service) 
c. SaaS (Software as a Service)
d. DaaS (Desktop as a Service)

The correct answer is: PaaS (Platform as


a Service)

Question 28

Correct

Mark 1.00 out of 1.00

28. What is the downtime per day for a


system showing 99.9% availability?

a. 0.4 seconds
b. 1 minute and 26 seconds 
c. 14 minutes and 23 seconds
d. 8 seconds

The correct answer is: 1 minute and 26


seconds
Question 29

Correct

Mark 1.00 out of 1.00

29. As a network administrator of your


company, you have decided to implement
redundant connections between network
devices to solve problems like network
bottlenecks. You have decided to
implement this change so that multiple
network interfaces and ports can act as
one logical interface and focus on
increasing total throughput and better
load balancing. What will you use to
implement this change in your Windows
devices?

a. NIC teaming 
b. Port aggregation
c. Load balancing
d. Clustering

The correct answer is: NIC teaming

Question 30
Correct

Mark 1.00 out of 1.00

30. The organization where you are


currently working as a network
administrator has a class A network
address 10.0.0.0 with 40 subnets. You
want to add another 60 new subnets to
the network. You would like to still allow
for the largest possible number of host
IDs per subnet. Which one of the
following subnet masks will you choose
in this scenario?

a. 255.248.0.0
b. 255.240.0.0
c. 255.252.0.0
d. 255.254.0.0 

The correct answer is: 255.254.0.0


Question 31

Correct

Mark 1.00 out of 1.00

31. Tobias needs to create a network for


the sales department, which has 86
users, using the smallest subnet
possible. Which one of the following is
the total number of usable IP (Internet
Protocol) addresses that will remain free
after creating this subnet?

a. 42
b. 170
c. 168
d. 40 

The correct answer is: 40

Question 32
Correct

Mark 1.00 out of 1.00

32. What subnet mask can be used to


segment the 172.16.0.0 network to allow
for a minimum of 6 subnets while
maximizing the number of hosts per
subnet?

a. 255.255.224.0 
b. 255.255.240.0
c. 255.255.248.0
d. 255.255.252.0

The correct answer is: 255.255.224.0

Question 33

Correct

Mark 1.00 out of 1.00

33. A network with 10 bits remaining for


the host portion will have how many
usable host addresses?

a. 1024
b. 1022 
c. 1028
d. 1026

The correct answer is: 1022


Question 34

Correct

Mark 1.00 out of 1.00

34. In the context of IPv4 Class C subnet


masks, a network with a CIDR (Classless
Interdomain Routing) notation of /26
would have what subnet mask?

a. 255.255.255.192 
b. 255.255.255.224
c. 255.255.255.128
d. 255.255.255.252

The correct answer is: 255.255.255.192

Question 35
Correct

Mark 1.00 out of 1.00

35. You as a network administrator want


to protect the network from unauthorized
traffic, and for this reason, you decide to
change the native VLAN (Virtual Local
Area Network) to an unused VLAN so
that the untagged traffic is essentially
directed toward a dead-end. Which one
of the following commands will you use
to do this on a Cisco switch?

a. switchport trunk native vlan 


b. ip dhcp snooping
c. set port-mode trunk
d. set native-vlan-id

The correct answer is: switchport trunk


native vlan
Question 36

Correct

Mark 1.00 out of 1.00

36. You are working as a network


engineer at Krofter Securities. The
organization uses Cisco's Linux OS in all
its workstations. The network
administrator has asked you to use the
route utility to delete some static routes
used by the router. Which one of the
following commands will you use in this
scenario?

a. route 
b. route print
c. show ip route
d. show running-config

The correct answer is: route

Question 37
Correct

Mark 1.00 out of 1.00

37. Routing cost, is a value assigned to a


particular route as judged by the network
administrator; the more desirable the
path, the ______ its cost.

a. higher
b. lower 

The correct answer is: lower


Question 38

Correct

Mark 1.00 out of 1.00

38. Beevan works as a network analyser


for an ISP (Internet Service Provider). The
network manager has asked him to use a
protocol for the routers that can scan
beyond the home territory and can
instruct a group of routers to prefer one
route over other available routes. Which
one of the following routing protocols
should be used in this scenario?

a. EIGRP (Enhanced Interior


Gateway Routing Protocol)
b. IS-IS (Intermediate System to
Intermediate System)
c. BGP (Border Gateway 
Protocol)
d. OSPF (Open Shortest Path First)

The correct answer is: BGP (Border


Gateway Protocol)

Question 39

Correct

Mark 1.00 out of 1.00

39. Bradley has been running a business


in his garage for over a period of 10
years. He plans on expanding the
business by opening three new offices in
three different cities. Since he has
accumulated sufficient profits to move to
a larger office space, he plans to upgrade
his network connection to one with a
dedicated and symmetrical bandwidth.
Bradley approaches Mantle Solutions, an
ISP (Internet Service Provider). Which
one of the following options should be
offered by the ISP in this scenario?

a. Cable broadband
b. MPLS (Multiprotocol Label
Switching)
c. SD-WAN (Software-Defined Wide
Area Network)
d. Leased lines 

The correct answer is: Leased lines


Question 40

Correct

Mark 1.00 out of 1.00

40. How is a posture assessment


performed on an organization?

a. A thorough examination of 
each aspect of the
organization's network is
performed to determine how
it might be compromised.
b. A third-party organization is
tasked with attempting to break
into the organization and
compromise security to
determine threat vectors.
c. A report of data that is subject to
special regulation is created,
such that the organization is
aware of what data needs
protection.
d. An assessment of how a
network will perform under
stress is performed to determine
if the network throughput is
adequate.

The correct answer is: A thorough


examination of each aspect of the
organization's network is performed to
determine how it might be compromised.

Question 41
Correct

Mark 1.00 out of 1.00

41. You, as a network engineer, want to


have an insight into your network's
weaknesses that need attention. You
want to search for devices with open
ports indicating which insecure service
might be used to craft an attack and
identify unencrypted sensitive data.
Which scanning tool will you use in this
scenario?

a. Nmap
b. Nessus 
c. Metasploit
d. Honeypot

The correct answer is: Nessus


Question 42

Correct

Mark 1.00 out of 1.00

42. HealthCity Nursing Home is a newly


opened hospital with many employees,
doctors, nurses, and support staff. The
upper management of the hospital wants
to draft a security policy that outlines the
guidelines, rules, restrictions, and
consequences of violations, all of which
help minimize the risk involved in
allowing restricted access to some
users. The doctors who have access to
protected patient information must be
informed what they can and cannot do
with that patient data and what special
precautions they must take to protect
patients' privacy. Certain checks and
balances must also be maintained and
defined in the policy measures in detail.
Which one of the following security
policies should be used in this scenario?

a. An NDA (Non-Disclosure
Agreement)
b. An anti-malware Policy
c. A PUA (Privileged User 
Agreement)
d. An AUP (Acceptable Use Policy)

The correct answer is: A PUA (Privileged


User Agreement)
Question 43

Correct

Mark 1.00 out of 1.00

43. Johnathan is the network engineer of


an organization that restricts the use of
certain webpages. As he does not have
any pending work, he decides to take a
break and watch a movie online until a
task is assigned to him. Which one of the
following actions is best suited for him in
this situation so that the IP address of
the organization is not compromised?

a. Use an IDS (Intrusion Detection


System) to bypass security
protocols
b. Use proxy servers to mask 
Internet activities
c. Use a network-based firewall for
this purpose
d. Use a packet-filtering firewall for
this purpose

The correct answer is: Use proxy servers


to mask Internet activities

Question 44
Correct

Mark 1.00 out of 1.00

44. You have been working as a network


engineer with an organization. You have
decided to implement information
access control to limit the users and
devices that can get to your data and
other network resources. For this
purpose, you plan on using a username
and password as a measure of security
to grant any user access to your
organization's resources. Which element
of the AAAA acronym will you use to
apply this security measure?

a. Authentication 
b. Authorization
c. Accounting
d. Auditing

The correct answer is: Authentication


Question 45

Correct

Mark 1.00 out of 1.00

45. As a network administrator, Murphy


wants to add additional layers of security
to prevent hackers from penetrating the
network. To achieve this, he plans on
adding additional authentication
restrictions that might strengthen
network security. Which one of the
following should he do in this context?

a. Set a limit on consecutive 


logon attempts
b. Specify the maximum hours that
a user can be logged in
c. Specify a geographic location
d. Specify a particular time of the
day for users to be logged in

The correct answer is: Set a limit on


consecutive logon attempts

Question 46
Correct

Mark 1.00 out of 1.00

46. You are the network engineer for


Muhan Mobile Services. The network
administrator has asked you to separate
the authentication, auditing, and
authorization capabilities. Which AAA
protocol will you use in such a scenario?

a. RADIUS (Remote Authentication


Dial-In User Service)
b. TACACS+ (Terminal Access 
Controller Access Control
System Plus)
c. RBAC (Role-Based Access
Control)
d. Kerberos

The correct answer is: TACACS+


(Terminal Access Controller Access
Control System Plus)
Question 47

Correct

Mark 1.00 out of 1.00

47. James, a network engineer, has been


contracted by a company to monitor
network performance. To know and
analyse any problem in a network, James
will need to understand how the network
functions in a normal state. Which one of
the following will be of use to James in
this scenario.

a. Checking the network's 


performance baseline.
b. Checking the interface statistics
of the network.
c. Checking if the network is
operating at maximum capacity.
d. Checking if the connection has
jitter.

The correct answer is: Checking the


network's performance baseline.

Question 48
Correct

Mark 1.00 out of 1.00

48. You have been hired as a systems


analyst by an online food delivering
service. Your job requires you to keep the
network congestion free during peak
hours and to ensure that important traffic
can survive the congestion while fewer
sensitive frames are discarded. Which
one of the following techniques will you
use in such a scenario?

a. Window policy
b. Acknowledgment policy
c. Discarding policy 
d. Admission policy

The correct answer is: Discarding policy


Question 49

Correct

Mark 1.00 out of 1.00

49. A fraudulent financial deal has just


taken place in the company where you
are working as a network administrator.
The data of the company will be
collected in such a way that it can be
presented in a court of law for the
purpose of prosecution. Some of the
forensic data available for analysis may
be damaged or destroyed if improperly
handled. You have been assigned the
duty to safeguard sensitive information,
logged data, and other legal evidence
until the first responder or incident
response team can take over the
collection of evidence. To prevent
contamination of evidence, you have
made sure that each device involved is
isolated-that is, the device is
disconnected from the network and
secured to ensure that no one else has
contact with it until the response team
arrives. What is the next step that you will
take in the event of such an illegal
activity?

a. Monitor evidence and data


collection.
b. Protect the chain of custody.
c. Document the scene. 
d. Monitor transport of data and
equipment.

The correct answer is: Document the


scene.
Question 50

Correct

Mark 1.00 out of 1.00

50. Donald is a schoolteacher living in


Atlanta. While conducting online classes,
he experienced a momentary decrease in
voltage. His computer shut down and
when he switched it back on, he realized
that he had lost some data. He called his
friend Chadwick who is a network analyst
to check out what the issue was.
Chadwick found that there was a power
flaw caused by an overtaxed electrical
system. Such voltage decreases can
cause computers or applications to fail
and potentially corrupt data. What kind of
power flaw caused this issue in Donald's
house?

a. Brownout 
b. Blackout
c. Noise
d. Surge

The correct answer is: Brownout

You might also like