Monday, November 27, 2017

CMIT 265 CMIT265 CMIT/265 Practice Exam 15 Answers

CMIT 265 CMIT265 CMIT/265 Practice Exam 15 Answers


BUY HERE

CMIT 265 Fundamentals of Networking Network + Practice Exam 15 Answers (2017)
90 Questions+ Answers
Which of the following is an example of twofactor authentication? 
You are adding a new rack to your data center, which will house two new blade servers and a 
new switch. The new servers will be used for virtualization. 
The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough plenum UTP cable that will be run through the suspended tile ceiling of the data center. 
To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. The only power available in the data center is located on the wall opposite the new server rack, so you must run extension cords across the floor to plug in the UPS unit. 
There are problems with this plan. What should you do? 
Which of the following topologies connects all devices to a trunk cable? 
While troubleshooting a problem on a Linux system, you run a utility that generates the following 
output: 
5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms
6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms 38.050 ms
7 oc486yy.Seat.someisp.net (14.248.154.129) 57.440 ms 56.678 ms 57.675 ms
8 t223hghytry.swa.someisp.net (142.133.89.232) 103.041 ms 57.181 ms 56.619 ms
9 t8343mmd.cgssel.someisp.net (162.191.10261) 91.977 ms 93.971 ms 93.767 ms
10 twirem2.cgssfdl.ip.someisp.net (145.97.133.23) 92.463 ms 92.337 ms 93.523 ms
11 twerrm1.nfffsiny.ip.someisp.net (117.116.141.38) 106.000 ms 106.007 ms 105.283 ms
12 gbed22repp0.n5ddsdsy.ip.someisp.net (123.194.132.8) 103.198 ms 105.447 ms 104.263 ms 
Which of the following utilities were you using? 
Which of the following commands would display the output shown here? 
Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports?
Which of the following is the best recommendation for applying hotfixes to your servers? 
Match the port security MAC address type on the left with its description on the right. 
MAC address manually identified as an allowed address
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. 
Which of the following conditions are you most likely to experience? 
You have installed antimalware software that checks for viruses in email attachments. You configure the software to quarantine any files with problems. 
You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the antimalware software. 
What has happened to the file?
In which of the following situations would you use port security? 
You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. 
Which of the following recommendations should you follow when applying the hotfix? 
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. 
You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. 
Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. 
Will this implementation work? 
....
Question 90:
You manage a network that uses a single switch. All ports within your building connect through 
the single switch. 
In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. 
Which feature should you implement? 

No comments:

Post a Comment