logo Use CA10RAM to get 10%* Discount.
Order Nowlogo

Philips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment on the floors of a building connected by a LAN? (Choose One) a Geographic locations b Departmental boundaries c Device types d VLANs

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

1) Identify the current name of a DMZ (Demilitarized Zone). (Choose One) a ANDing b Network ID c Host ID d Screened Subnet

2) Philips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment on the floors of a building connected by a LAN? (Choose One) a Geographic locations b Departmental boundaries c Device types d VLANs

3) JVC Corporation is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario? (Choose One) a Geographic locations b Departmental Boundaries c Device types d VLANs

4) Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space? (Choose One) a VLSM b Site prefix c VTP d Classless addressing

5) What will be the number of hosts per subnet in a 255.255.255.240 IPv4 Class C subnet mask? (Choose One) a 30 b 14 c 62 d 126

6) You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.169.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization’s nine different floors. How many bits will you borrow from the host portion of the address portion of the ID address in this scenario? (Choose One) a Three bits b Two bits c Four bits d Five bits

7) When a router connects to a switch that supports multiple VLANs, it is sometimes called ________________ (Choose One) a A router-on-a-stick b Trunking c a native VLAN d ICS

8) Which of the following VLANs receives all untagged frames from untagged ports? (Choose One) a Data VLAN b Voice VLAN c Native VLAN d Management VLAN

9) Which of the following carries user-generated traffic, such as e-mail, web browsing, or database updates? (Choose One) a Data VLAN b Voice VLAN c Private VLAN d Management VLAN

10) Brown Industries consults you to review and check for faults in a recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries’ departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation? (Choose One) a Incorrect VLAN assignment b Incorrect port mode c VLAN isolation d Double tagging

11) Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation? (Choose One) a Incorrect VLAN assignment b Incorrect port mode c VLAN isolation d Double tagging

12) Analyze which of the following is true about a default VLAN. (Choose One) a Ports in default VLAN can be reassigned to other VLANs b To protect a network from unauthorized traffic, a default VLAN should be changed to an unused VLAN c A default VLAN can be used to carry user-generated traffic, such as e-mail, web browsing, or database updates d A default VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency

13) Which of the following can be used to provide administrative access to a switch? (Choose One) a Data VLAN b Voice VLAN c Native VLAN d Management VLAN

14) You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation? (Choose One) a Stac master b VLAN hopping c SAID d MTU

15) You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all other switches in the network. Which of the following will you use? (Choose One) a Stack master b VLAN hopping c SAID d MTU

16) Which of the following will you use to assign a VLAN based on the switch port the device is connected to? (Choose One) a Static VLAN assignment b Dynamic VLAN assignment c SAID d Subinterface 17) The part which identifies the network in an IPv4 address is known as _____________.

(Choose One) a the host ID b the site prefix c the network ID d the VTP 18) How many bits are used in a network with a subnet mask 0f 255.0.0.0? (Choose One) a 8 b 16 c 32 d 64 19) In the formula 2n=Y, what does n represent? (Choose One) a It equals the number of hosts available in each subnet b It is the number of subnets that result c It equals the number of bits remining in the host portion. d It is the number of bits that must be switched from the host address to the network ID 20) Subnetting, which alters the rules of classful IPv4 addressing is known as _________ . (Choose One) a IP helper address b relay agent c classless addressing d VLSM

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Atharva PatilComputer science

634 Answers

Hire Me
expert
Chrisantus MakokhaComputer science

695 Answers

Hire Me
expert
AyooluwaEducation

851 Answers

Hire Me
expert
RIZWANAMathematics

728 Answers

Hire Me

Get Free Quote!

281 Experts Online