D325 Networks Final - Set 2 - Part 1
Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.
Question 1: A network architect analyzes the software-defined networking model and reviews the layer that applies the business logic to decide how to prioritize traffic, secure data, and where to switch data. What is the appropriate layer for this description?
Question 2: When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer's physical NIC, a network engineer creates a virtual switch that binds to the host's NIC to allow the VM to communicate on the physical network. What switch did the network engineer create?
Question 3: While looking for a cloud deployment model for business operations, the network specialist looks for a model that a third party hosts for the organization's exclusive use. Which cloud deployment model meets the network specialist's and businesses' needs?
Question 4: A network consultant is considering what technologies to use when adding a storage area network (SAN). What are the two most popular SAN connection types? (Select all that apply.)
Question 5: While looking for a cloud service model for business, the network specialist looks for a model that allows the organization to rent components and internet links on an as-needed basis from the service provider's data center. Which cloud service model meets the network specialist's and businesses' needs?
Question 6: You are configuring a point-to-point link between two routers and have been assigned an IP of 77.81.12.14/30. What is the network ID associated with this IP assignment?
Question 7: What is the network ID associated with the host located at 192.168.0.123/29?
Question 8: Rick is configuring a Windows computer to act as a jump box on his network. He implements static routing to control the networks and systems the jump box communicates with. Which of the following commands did he use to configure this on the Windows machine?
Question 9: You are trying to select the BEST network topology for a new network based on the following requirements. The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client's requirements?
Question 10: An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do?
Question 11: When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?
Question 12: Your company wants to create highly available data centers. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?
Question 13: A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected?
Question 14: You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?
Question 15: Scott is a brand new network technician at Dion Training. He has been told to remote into the edge switch from his desk and enable DHCP snooping. Which of the following commands should he use?
Question 16: You are installing a new LAN in a building your company just purchased. The building is older, but your company has decided to install a brand-new Cat 6a network in it before moving in. You are trying to determine whether to purchase plenum or PVC cabling. Which environmental conditions should be considered before making the purchase?
Question 17: Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera's security concerns? (Select the best two.)
Question 18: Andy is a network technician who is preparing to configure a company's network. He has installed a firewall to segment his network into an internal network, a DMZ or screen subnet, and an external network. No hosts on the internal network should be directly accessible by their IP address from the Internet, but they should be able to reach remote networks if they have been assigned an IP address within the network. Which of the following IP addressing solutions would work for this particular network configuration?
Question 19: What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Question 20: Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? (Select the best two.)
Need Guaranteed Results?
Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!
Get Exam Support