Transcript for:
Network Plus Key Questions Overview

hello everyone welcome back to my channel this is Dean with another video for Network plus this video is combination of my five previous Network Plus videos so all together we are having 50 questions here with answers explained but if you want more questions different than these ones and more complicated ones which simulate the real exam experience you can check the link in the description where you can find my udemy course okay let's get start with this video first question is you have been asked to install a network that will give the network users the greatest amount of false tolerance which of the following Network topologies would you choose mesh star Hub and Spock boss and ring so because they asked for the highest amount of all tolerance we should choose mesh one the mesh network is the most complicated one so a mesh Network uses a point-to-point connection to every device on the network this creates multiple points for the data to be transmitted around the network and therefore creates a high degree of redundancy the starhub and spoke ring in boost pouch do not offer the greatest amount of fault tolerance which layer of the OSI reference model contains the mac and loc sub layers data link layer physical layer Network layer or transport layer so the right answer here is data link layer the data link layer of the OSI model is the only layer that is typically divided into sub layers question number three which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data time division multiplexing Simplex Broadband or base band and the right answer is baseband baseband technology uses the entire medium to transmit in contrast Broadband technology can divide the medium into different channels a great example of broadband is the use of coaxial cable you might have in your home which carries cable television signals as well as high speed internet so guys many of you know I mostly upload CompTIA a plus videos but I'm starting now to make Network plus I'll be making also simulations so if you're studying for Network plus a plus please consider subscribing hit the like button leave a comment I appreciate that a lot thank you question number four what is encapsulated directly inside of a frame IP packet TCP segment UDP datagram or icmp packet and of course the right answer here is IP packet question number five how do DNS root name servers respond to DNS queries they give actual answers to queries they give referrals they check authentication or query another server on behalf of their clients the right answer here is give referrals DNS root name servers give referrals to the appropriate authored alternative TLD DNS server question 6 in a physical star topology what happens when a workstation loses its physical connection to another device no devices can communicate because there are now two interminated Network segments the ring is broken so no devices can communicate only that workstation loses its ability communicate that workstation and the device is connected to loose communication with the rest of the network so we have start topology and we lose only the connection only that workstation loses the connection so this is the ability to communicate that's the right answer in a star topology each workstation connects to a hub switch or similar Central device but not to other workstations the benefit is that when connectivity to this Central device is lost the rest of the network leaves on question seven which of the following is at the top of the three tired architecture axis h control layer distribution aggregation layer or core and the right answer here is core the co-layer ties together all the switches at the distribution layer and acts as the point of connection to the external connections including the internet or system at this level run exclusively at OSI layer 3. question number eight an IT director is setting up new disaster and ha policies for a Company Limited downtime is critical to operations to meet corporate requirements the director set up two different data centers across the country that will stay current on data and applications in the event of an outage the company can immediately switch from one data center to another which of the following does this best describe is this describe load balancing data mirroring a hot site a warm site or multi-pathing and the right answer is a hot site a hot site is a leased facility that contains all the resources needed for full operation this environment includes computers race flooring full utilities electrical and Communications wiring networking equipment and uninterrupted power supplies the only list or resource that must be restored at the hot site is the organization's data usually only particularly it should only take a few minutes to bring a hot site to full operation also a hot site provides the quickest recovery it is the most expensive to maintain in addition it can be administratively hard to manage if the organization requires proprietary Hardware or software a hot site requires the same security controls as the primary facility and full redundancy including Hardware software and communication wiring alright guys if you want more questions I have created udemy course for Network plus please plus plus please check the link in the description so question 9 IP addresses resides of which layer of the OSI reference model session layer Network layer data link layer or transport layer and as you know IP addresses are in the network layer and last question for this video I'll be uploading more uh question more videos like this so please subscribe support me by liking the video leave a comment that means a lot to me guys question 10 client devices cannot enter a network and the network administrator determines the DHCP scope is exhausted the administrator wants to avoid creating a new DHCP pool which of the following can be administered can the administrator perform to resolve the issue reduce the lease time install more switches install load balances or decrease the number of vlans and the right answer here is reduce the lease time reducing the least time is the best answer here while there isn't much additional info regarding how long it currently is if someone configured at least time for of two weeks there will be bunch of lingering leases that aren't in use and could be utilized by new devices which of the following would be best to use to detect a Mac spoofing attack internet control message protocol Dynamic host configuration protocol internet message access protocol or reverse address resolution protocol and here the right answer is reverse address resolution protocol a Max proofing attack consists of changing the MAC address of a network device network card a client computer can use the reverse address solution protocol to request its Internet Protocol address and Mac address from a computer network to check its accuracy question 12 which of the following is a connectionless transport layer protocol UDP IP TCP Sip and the right answer is UDP user datagram protocol is a connectionless transport layer protocol unlike TCP transmission control protocol which provides a reliable and connection orientated communication UDP does not establish a formal connection before sending data it simply sends data packets or datagrams to the destination without establishing a dedicated communication path this makes UDP faster but less reliable compared to TCP as there is no error checking acknowledgment or flow control in UDP alright guys many of you know I mostly upload videos for CompTIA I plus but I recently started making videos for Network plus so if you study for these certificates Please Subscribe for my channel I really appreciate if you hit the like button and leave a comment that means a lot to me let's keep going with the next question what settings ultimately controls the size of packets that are moving through the modern Network MTU SSH TTL csma SD right answer here is MTU which stands from Maximum transmission unit so MTU is the setting that ultimately controls the size of packets moving through a modern Network mtube represents the maximum size of a data packet that can be transmitted over a network in a single frame it is an important parameter in network communication because if a packet is larger than the MTU of a particular Network segment it needs to be fragmented into smaller packets to fit within the MTU limit time to leave is a field in IP packets that determines how long a packet should remain in the network before being discarded secure shell is a protocol used for secure remote access and control carrier sends multiple access with collusion detection is an Ethernet protocol used for sharing a network channel among multiple devices guys if I talk too slow you can speed up the video so in that case it won't you won't get bored all right question 13. I think we had two times question 12 but never mind which of the following statements is true about the differences between a peer-to-peer Network and a client server Network four possible answers first one on a peer-to-peer Network all workstation must share their resources peer-to-peer networks are inherently less secure than client server Networks on peer-to-peer networks every workstation is capable of authenticating users peer-to-peer networks are illegal while client server networks are legal alright so the right answer here is on peer-to-peer networks every workstation is capable of authenticating users all right again a peer-to-peer Network calls for each workstation to maintain accounts for authenticating users that access their shared resources on a client server Network authentication is centralized peer-to-peer networks can be more difficult to administer than the client server networks but they are not inherently less secure peer networks sharing copyrighted content on the internet are illegal but it is not illegal to share private resources on a peer-to-peer Network workstations on a peer-to-peer Network are not required to share their resources but they are capable of it next question a technician is configuring a network switch to be used in a publicly accessible location which of the following should the technician configure on the switch to prevent unintended connections geofencing secure SNMP Port security or DHCP snooping so should configure Port security poor security is pretty obvious the keyword here is switch so poor security is key to this question 15 which of the following categories of UTP cabling are commonly used for 1000 base T networks choose two answers category Cat5e CAT5 Cat6 or cat 6 G right so we need to choose two answers the first answer it will be cut 5e and after that comes cat 6. both cat 5e category 5e and Category 6 unshielded twisted pair cabling are commonly used for 1 000 base T networks which refer to gigabit Ethernet these categories of cabling offer higher data transfer rates and improved performance compared to Category 5 cabling Category 5 e support speeds up to 1000 megabits per second or one gigabit while categoristic supports even higher speeds and reduced crosstalk making it suitable for High Speed network connections category 6G is not a recognizable category of UTP cabling alright guys I want to tell you something I will be uploading simulations for Network plus maybe for uh come to your a plus as well so please consider subscribing and please support me by liking the video and leaving a comment or also like I said you can purchase my udemy course with 360 questions for Network plus exams question 16 which of the following is the right eight pin connector in most ethernet Networks RJ45 rj11 DB9 or St and of course this is RJ45 rj45r stands for registered Jack 45 connector is the right 8 pin connector commonly used in most ethernet Networks it's used to determine to terminate ethernet cables and connect devices such as computer switches routers and access points to the network the RJ45 connector has 8 pins and is designed to work with various ethernet standards including CAT5 Cat6 cat6a cables the other options mentioned are not correct connectors for internet networks St is a type of fiber optic connector DB9 is a is a connector commonly used for serial Communications and rj11 is used for Telephone Connections question 17 Jack is a software developer who has been given the task of creating an application that requires warn quarantined delivery of information between end systems at which layer of the Open System interconnection model does the protocol that provides the guaranteed delivery loan and what type of protocol must Jack use so transport layer connection orientated Network layer connection orientated data link layer connectionless or application layer again connectionless and we need to use the connection orientated transport layer in the Open System interconnection model the OCR the protocol that provides guaranteed delivery of information between end systems runs and the transport layer Jack should use a connection orientated protocol at the transport layer to ensure a reliable and ordered ordered delivery update how many assignable IP addresses exist in the 172.16.1.10 Slash 27 30 32 40 64 or 14. so in the next slide there is explanation but here the right answer is 30 let's see why in the subnet 172.16.1.10 forward slash 27 the 27 indicates that the subnet mask is 255.255.255.224 this means that the first 27 bits of the IP address are used for the network portion leaving 32-27 equal 5 bits for the Post portion with 5 bits for the host portion you can have 2 to the power of 5 equal 32 possible IP addresses however two of those addresses are reserved the network address which is 172.16.1.0 and the broadcast address which is 172.16.1.30.31 and this leaves 32-2 equal 30 assignable IP addresses for hosts okay let's go to the next one which Cloud characteristic refers to the ability to dynamically scale resources as needed during times of grid demand as well as in times of low demand scalability elasticity centralized or on demand and here the right answer is elasticity I think that was the last question for this video Let's see the information for it elasticity in cloud computing refers to the ability of a cloud service to automatically scale resources up or down based on current demand this allows the system to handle varying workloads efficiently both during times of high demand and low demand while ensuring Optimal Performance and cost efficiency oh we have another question this one is the last one for this video what traffic pattern refers to data that travels outside the data center or Enterprise on premises east to west west to south or north to south right answer north to south north south refers to data transfers between the data center and that outside of the network East-West traffic is a concept referring to network traffic flow within a data center between servers on-premises can be through f offers in the old traditional approach the data then the servers are kept in-house although West to South is a direction it is not a valid specified data path what is the name of the DHCP message that a client sends when it needs to obtain IP address information this message is the first step in the four-way DHCP process DHCP discover dhcprequest DHCP offer or DHCP Act and the right answer is DHCP discover in the DHCP Dynamic host configuration protocol process the client sends a DHCP discover message to discover available DHCP servers on the network and request IP address information this is the initial step in the process of obtaining an IP address dynamically from a DHCP server question 22 where might you set the least duration for a DHCP server that is servicing many clients in the network the relay agent the DHCP forwarder The Zone record or scope options you can do that in the scope options in a DHCP server configuration you can set the list duration for IP addresses within a specific scope scope options allow you to define various settings for the clients within that scope including list duration subnet mask Gateway and more question 23. what type of DNS message is often used to perform reverse lookups txt MX PTR or SRV the right answer is PTR which stands for pointer a pointer record is used in DNS 2. to perform reverse lookups mapping and IP address to a domain name this is particularly useful when you want to find the domain name associated with a given IP address all right guys I just want to mention that I have created a udemy course for Network plus with with lots of questions which will help you to pass your exam I hope the link is in the description you can check it out and also you like I said you can subscribe if you're studying for Network plus and a plus I'll be uploading more videos I will appreciate your support thank you question 24 the network administrator is informed that a user's email password is frequently hacked by Brute Force programs which of the following policies should the network administrator Implement to best mitigate this issue choose two complex passwords two-factor Authentication geofencing explicit deny captive portal or row based access so we need to choose two answers and the first one of course you need to have to focus or authentication and complex password as a must to factor authentication adds an extra layer of security to the login process by requiring users to provide a second form of authentication in addition to their password this could be something they have such as a code sent to their mobile device or something they are such as fingerprint or face recognition by implementing qfa 2fa even if an attacker manages to obtain the user's password through Brute Force methods they would still need the second factor of authentication to gain access complex passwords implementing a policy that requires users to create and use complex passwords can significantly enhance the security of their accounts complex passwords typically include a combination of uppercase and lowercase letters numbers and special characters by enforcing this policy the network administrator makes it harder for Brute Force programs to guess the passwords reducing the risk of successful hacking attempts question 25 which of the following types of systems are frequently used to collect information from intrusion detection systems radius Sim Voiceover IP and gfw and the right answer is this one security information and event management systems can function as a central Clearinghouse for information gathered by idss and other security processes Next Generation firewall remote authentication dial in user service and voice over IP are not systems that collect IDs information guys if you want more videos like this please let me know in the comments I'll appreciate if you hit the like button question 26 what is the distance limitation of a 1000 base T ethernet Network 100 meters 500 meters 185 meters or 1000 meters and the right answer here should be a hundred meters a 1000 base T ethernet network has a distance limitation of 100 meters which is 328 feet for each segment of twisted pair cabling question 27 if two devices simultaneously transmit data on an Ethernet Network and a collision occurs what does each station do in an attempt to resend the data and avoid another Collision each device waits for a clear to send signal from the switch each device randomly picks a priority value and the device with the highest value transmits first each device compares the other device's priority value determined by IP address with with its own and the device with the highest priority value transmits first each device sets a random back of timer and a device attempts retransmission after the timer expires and the this is the right answer when a collision occurs in an internet Network each device involved in the collusion sets a random back off timer after the timer expires the device attempts to re-transmit their data this approach helps avoid repeated collisions by introducing a randomized delay before early transmission attempts question 28. what's the difference between latency and Jitter there is no difference between the two latency is when Jitter in and response rate vary Jitter is a measure for Lance while latency is a measure for once Jitter is when latency and response rate for Ray the right answer is this one Jitter is when the latency in the response right while a certain amount of latency is expected between connections when the latency and the response rate start to vary and become inconsistent this is known as Jitter I I hope I'm pronouncing this word correctly guys excuse me if I'm doing it wrong usually this is noticeable in streaming applications and can be directly attributed to the bandwidth Jitter is one of the biggest problems with voice over IP question 29 what kind of media is used by 100 gbase sr10 ethernet SMF MMF UTP STP and the right answer here is is MMF 100 gbase sr10 ethernet uses multi-mode fiber as the transmission medium MMF is capable of carrying High data rates over relatively relatively short distances within data centers or network environments and the last question for today's video question number 30 we will continue it next time from question 31 to question 40. so yeah like I said you can subscribe if you're studying for Network plus and you know you can like the video that helps more people find this video which of the following statements are true regarding vlans choose two answers a VLAN has a single broadcast domain a VLAN has a single collision domain for traffic to pass between two vlans that traffic must be routed because of a switch's MAC address table traffic does not need to be routed to pass between two vlans okay the first answer is where is it for traffic to pass between two villains the traffic must be routed and the other answer is VLAN has a single broadcast domain a VLAN virtual local area network indeed creates a separate broadcast domain devices within the same VLAN can communicate with each other without causing excessive broadcast traffic to devices in other vlans vlans are logically isolated from each other and in order for traffic to move between two vlans routing must occur routers or layer 3 switches are used to Route traffic between different vlans question 31 5 computers are connected to the same switch but only four are able to communicate with each other assuming that all of the hardware is functioning properly which of the following could be a reason for the fifth computer's communication problem the network is experiencing a switching Loop the fifth computer is experiencing an MTU black hole whereas the other four computers are not there is a Virtual Router between the fifth computer and the other four the switch has the fifth computer connected to a virtual local area network that's different from that of the other four and that will be the right answer if the fifth computer is in a different VLAN from the other four it would be unable to communicate with them a switching Loop would affect communication between all of the computers not just the fifth one an MTU black hole is a condition in which system is enabled to complete the path MTO Discovery process due to an interfering firewall because these five computers are all on the same land they all have the same MTU and path mq discover is not necessary a virtual Auto would enables switch computers on different subnets to communicate with each other it will not prevent them from communicating next question in a topology running STP every Network segment has a single space space port which is the port on that segment that is closest to the root bridge in terms of cost we have root non-designated designated or non-root and the right answer would be designated port in a spanning 3 protocol STP topology every Network segment has a designated Port which is the port on that segment that is closest to the road bridge in terms of costs this designated Port is responsible for forwarding data traffic on the segment while preventing Loops in the network the non-designated ports are blocked to prevent loops and ensure a loop free topology we're going to question 33 guys every video has 10 questions so you can subscribe if you're studying for Network plus I have also many videos for a plus you can check them out if you want to pass your A-Plus exams before taking Network Plus okay question 33 what is the IEEE standard for link aggregation we have 802.1d 802.3 A.D 802.1 Q or 802.3 AF and the right answer is 802.3 A.D let's see a little bit of explanation the IEEE standard for link aggregation is 802.380 also known as link aggregation control protocol or lacp this standard defines a method for combining multiple physical network connections into a single logical link to increase bandwidth redundancy and fault tolerance question 34 what is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3 AF standard we have 15.4 Watt 26.4 watt 32.4 or 7.7 the right answer is yep 15 4.4 but according to the standard a switch is allowed to provide a maximum of 15.4 watts of power per port for device that supports power over ethernet guys I'm preparing some simulations for Network plus so you can subscribe you can like this video I will appreciate it a lot question 35 what switch feature allows you to connect a network sniffer to a switchboard and tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected we have Port redirect we have Port interception Port mirroring or port duplexing and we have the right answer which is part mirroring Port mirroring is a switch feature that allows you to copy the traffic from one port to another one usually for the purpose of network analysis or monitoring using tools like Network sniffers this helps in analyzing Network traffic without interrupting the normal operation of the network question 36 which of the following is used to track and document various types of known vulnerabilities we have cm we have least privilege penetration testing zero day or cve right answer is this one c v e common vulnerabilities and exposures is a standardized system used to track and document various types of non-vulnerabilities in software and Hardware it provides a unique identifier known as a CV ID for each reported vulnerability the cve system is widely used in the cyber security Community to ensure consistent identification and communication of vulnerabilities question 37 SNMP uses series of objects to collect information about a managed device what is the name of the structure similar to a database that contains these objects MIB Baseline syslock rib the right answer is m i b which stands for for management information base simple Network management protocol uses a management information base which is hierarchical structure similar to a database the MIB contains a collection of managed objects that can be queried and manipulated using SNMP to Monitor and manage network devices next question as you monitor a key area of your network you discovered that the average latency spans a wide range you're seeing some periods of 50 milliseconds and other of 300. what is the term for this type of variation in delay Jitter wret dcsp CRC right answer cheetah cheetah refers to the variation in delay of packet transmission in a network it can cause an evenness in the delivery of packets resulting in varying latency times in the scenario described the wide range of latency from 50 milliseconds to 300 indicates the presence of Jitter cyclic redundancy check CRC is a method used to detect errors in data transmission it involves generating a checksum for transmitted data and comparing it to the checksum received at the destination it is not directly related to the variation in latency differentiated Services called point dscp is a field in the IP header used to specify the quality of service for packets in a network it helps routers and switches prioritize traffic based in on specific markings but it doesn't directly relate to variation in latency weighted random early detection is congestion avoidance mechanism used in network devices to manage packet Queen in draw its drops packets before a Quay becomes congested to prevent Network congestion while it can affect Network latency it's not specifically related to variation in latency question 39 on a VLAN what creates multiple paths to the storage resources and can be used to increase availability and add fault tolerance multi-pathing fcoe adding a management plane co-locating right answer multiple on a VLAN multi-parting creates multiple paths to the storage resources and can be used to increase availability and add fault tolerance last question for this video guys which DSL digital subscriber line technology can adjust its transmission speed based on line conditions we have hdsl we have idsl vdsl or radsl the right answer is the last one r a DSL stands for rate adaptive digital subscriber line technology and it can be it can adjust its rate of transmission based online conditions high bitrate digital subscriber line very high rate digital subscriber line and internet digital subscriber line do not use rate adaptive transmission question 41 which of the following DNS records works as an allies to another record we have cname SOA MX and AAA right answer is C name AAA record is used to find the IP address of a computer connected to the internet from a name cname record is a type of DNS record that Maps an allies name to a true or canonical domain name MX record specifies the Mayo server responsible for accepting email messages on behalf of a domain name SOI record is a type of resource record in the DNS containing administrative information about the zone which layer of the three tired model is most concerned with speed we have access h core policy or distribution aggregation the right answer is core the core layer is most concerned about raw speed question 43. how is connectivity for the Cisco ACI spine and leaf model implemented each Leaf device connects to each spine device each Leaf device must connect to each other Leaf device each spine device connects to every other spine device or each spine device connects to every other device and the right answer is each Leaf device connects to each spine device in Cisco application Centric infrastructure spine and leaf model each Leaf device connects to every spine device this architecture provides a high bandwidth low latency fabric for communication between devices and helps ensure efficient and predictable Network traffic patterns the leaf device are the leaf devices are responsible for connecting to the endpoints servers virtual machines Etc while the spine devices provide the high speed backbone connectivity between the leaf switches and help manage the other the overall fabric question 44. which of the following is an example of an East-West traffic flow in a modern Data Center the downloading of a larger number of archive files from a sun a container requesting Services provided by another container in the solution a client requesting email from a data center software as a service email solution a client uploading large numbers of archives files for a storage and the right answer is a container requesting Services provided by another container in a modern data center East West traffic flow refers to communication between different services or components within the data center itself option b represents a scenario where the container a microservice or application component is requesting Services provided by another container within the data center this type of traffic is typically lateral and internal to the data center infrastructure which is characteristic of East-West traffic flow when extending the range for a 2.4 gigahertz vo WLAN you can use non-overlapping channels for adjacent coverage cells however there should be some overlap in coverage between those cells using non-overlapping channels to prevent a connection from dropping as a user roams from one coverage cell to another what percentage of coverage overlap is recommended for these adjacent cells we have percentages here 10 percent to 15 20 to 25 15 to 20 or 5 to 10. and that's the right answer five to ten percent when extending the range for a 2.4 gigahertz wireless local area network is recommended to have a coverage overlap of around 5 to 10 percent between adjacent coverage cells using non-overlapping channels this this overlaps helps ensure a smooth transition for users as they run from one cell to another without experiencing connection drops question 46. the management team needs to ensure unnecessary modifications to the corporate Network are not permitted and Version Control is maintained which of the following documents would best support this a change management policy unacceptable use policy an incident response plan or a business continuity plan and the right answer is a change management policy this policy sets out the rules and guidelines for making changes to the network including who is authorized to make changes how changes are requested and approved and how changes are documented question 47 which of the following is most likely to generate significant East-West traffic in a data center a duplication of a hosted virtual server to another physical server for redundancy a query from an iot device to a cloud hosted server for a firmware update a backup of a large video presentation to cloud storage for Arc of all purposes or a download of navigation data to a portable device for offline access in the right answer is a duplication of a hosted virtual server so East-West traffic in a networking context is the transfer of data packets from server to server within a data center the term East-West for this type of traffic comes from Network diagram drawings that usually depict local area network traffic horizontally question 48 webs rc4 approach to encryption uses a 24-bit string of characters added to transmitted data such that the name the same plain text Data frame will never appear as the same web encrypted data frame what is this this string of characters called we have orthogonal descriptor session key initialization vector or chips and the right answer is initialization initialization vector web wired equivalent privacy uses an initialization Vector IV which is a 24-bit string of characters added to the transmitted Data before encryption the IV helps prevent the same plane takes data frame from appearing as the same web encrypted data frame enhancing security question 49 which security technique uses Wireless Technologies to create an invisible bundle boundary around some points geofencing or driving vpa3 or LTE and the right answer is EFG offensive geofencing is a security technique that uses Wireless Technologies to create an invisible boundary around certain geographical points it can be used for various purposes including triggering alerts or actions when a device enters or exits a specified area and the last question for this video what are logical groupings of SNMP systems known as they're known as communities notes pairs or mirrors and they're known as communities SNMP communities are logical groupings of systems when a system is configured as a part of community it communicates only with other devices that have the same Community name and that's it for this video guys thank you for watching you can check my udemy course for Network plus it has different questions than those ones and I'm sure it might have it might help you pass your exam uh if you like this kind of videos please do subscribe for more I'll be uploading more videos for a plus Network plus so yeah keep in touch and if you study for this certification I wish you good luck and share with me as the comment did you pass or not pass your exam and are my material helpful or not thank you for support guys see you next time