CMIT 265 CMIT265 CMIT/265 Practice Exam 6 Answers
BUY HERE⬊
CMIT 265 Fundamentals of Networking Network + Practice Exam 6 Answers (2017)
90 Questions + Answers
Which component of a Change and Configuration Management policy specifies options for reverting a system back to the state it was in before a change was made?
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
When troubleshooting network issues, it's important to carry out tasks in a specific order. Drag the trouble shooting task on the left to the correct step on the right.
You manage a network with two locations: Portland and Seattle. Both locations are connected to
the Internet.
All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements:
• Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet.
• You want to use a sitetosite tunneling method instead of a hosttohost tunneling method.
• You want to use a sitetosite tunneling method instead of a hosttohost tunneling method.
Which IPv6 solution should you use?
Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver?
A network utilizes a Network Access Control (NAC) solution to protect against malware.
When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied.
What is this process called?
Which of the following connector types would you most likely use to connect to a T1 WAN service?
You are an IT consultant and are visiting a new client's site to become familiar with their
network. As you walk around their facility, you note the following:
• When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits.
• The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet.
• The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet.
• She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media.
• You notice the organization's network switch is kept in the server closet.
• You notice that a router/firewall/content filter allinone device has been implemented in the server closet to protect the internal network from external attacks.
• You notice the organization's network switch is kept in the server closet.
• You notice that a router/firewall/content filter allinone device has been implemented in the server closet to protect the internal network from external attacks.
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client?
Which of the following documents would likely identify that drop cables on your network use the T568A standard?
You suspect that your web server has been the target of a denialofservice attack. You would
like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
......
Question 90:
Purchasing insurance is what type of response to risk?
No comments:
Post a Comment