Search Header Logo
Chapter 8 Cybersecurity III

Chapter 8 Cybersecurity III

Assessment

Presentation

Computers

11th Grade

Practice Problem

Hard

Created by

Aiden Moore

FREE Resource

8 Slides • 55 Questions

1

Chapter 8

Specialized Networks

2

Multiple Choice

Which of the following BEST defines a SAN?

1

A mid-tier speed switch

2

A top-of-rack switch

3

A block-level storage network

4

A Core layer switch

3

Multiple Choice

Question image

You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server.

Which network-based storage technology is being used?

1

iSCSI SAN with clustering

2

NAS

3

Fibre Channel SAN

4

NAS with clustering

4

Multiple Choice

Which of the following are the components of a SAN?

1

Hosts, storage, and SAN fabric

2

Distribution switches, targets, and SAN fabric

3

Access switches, SAN fabric, and hosts

4

SAN fabric, core switches, and the initiator

5

Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN.

Question 4 (Part 1)

Boxes

Step 1 [ ]

Step 2 [ ]

Step 3 [ ]

Step 4 [ ]

Step 5 [ ]

Answer Choices

- Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN.

- Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.

- Deploy two FC switches.

- Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.

- Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs.

6

Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN.

Question 4 (Part 2)

Answers

Box 1 [ Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN. ]

Box 2 [ Deploy two FC switches. ]

Box 3 [ Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. ]

Box 4 [ Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs. ]

Box 5 [ Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. ]

7

Multiple Choice

Brett has been tasked with creating a new SAN. The company currently has Gigabit internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN. Brett tells the CTO that this will not work. Which of the following BEST describes the problem?

1

Fibre Channel over Ethernet requires 10 Gigabit internet.

2

Fibre Channel over Ethernet is still only conceptual.

3

Fibre Channel over Ethernet requires all new, specialized equipment.

4

Fibre Channel over Ethernet is slower than iSCSI.

8

Multiple Choice

What BEST describes the designed purpose of InfiniBand?

1

Unlimited 10 Gigabit internet

2

Cloud platforms

3

High-performance supercomputers

4

Jumbo frames

9

Multiple Choice

You are in the process of configuring an iSCSI storage area network (SAN) for your network.

You want to configure a Windows Server system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.

Which tool should you use?

1

iSCSI option under File and Storage Services in Server Manager

2

Multipath I/O

3

iSCSI Initiator

4

Internet Storage Name Service

10

Multiple Choice

Within an SDN, what is commonly referred to as the brains?

1

Hosts

2

Initiators

3

Fabric

4

Controllers

11

Multiple Choice

Which option BEST describes the third layer in the SDN architecture?

1

Control

2

Management

3

Application

4

Infrastructure

12

Multiple Choice

What are the three layers of an SDN?

1

Software, Management, and Construction

2

SaaS, IaaS, and PaaS

3

Application, Control, and Infrastructure

4

Physical, Control, and Virtualized

13

Multiple Choice

Which of the following BEST describes the main purpose of the codec used in VoIP?

1

An algorithm that exclusively controls sound quality.

2

An algorithm for external calls to be made over VoIP.

3

An algorithm to control poor quality transmissions.

4

An algorithm to compress data in order to save on bandwidth.

14

Multiple Choice

Which of the following BEST describes VoIP (Voice over Internet Protocol)?

1

A protocol optimized for voice data transmission (telephone calls) through a wireless network.

2

A protocol optimized for voice data transmission (telephone calls) through a 5G switched IP network.

3

A series of protocols optimized for voice (telephone calls) and digital data transmission through a packet-switched IP network.

4

A protocol optimized for voice data transmission (telephone calls) through a packet-switched IP network.

15

Multiple Choice

Which of the following are considered VoIP endpoints?

1

Hard phones and soft phones

2

Soft phones and PBX

3

Satellite phones and soft phones

4

Hard lines and cell phones

16

Multiple Choice

Larry is tasked with implementing a VoIP system in the office. He presents his research to his boss, who wants to use the current hard phones to save money. What BEST explains why this is not possible?

1

Hard phones don't conform to IEEE 805.3.

2

The old phones don't provide conferencing, but VoIP hard lines do.

3

Regular hard phones only work with SNMP, and VoIP hard phones use UDP and TCP.

4

A hard phone does not have the internal computing parts to accept VoIP transmissions.

17

Multiple Choice

Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference?

1

Jitter is the up and down variation in latency.

2

Latency is the up and down variation in jitter.

3

Jitter is caused by an inadequate codec.

4

Latency is caused by sampling; jitter is not.

18

Multiple Choice

Dan, a network administrator, gets an email from the CEO. She is upset because people keep talking over each other on conference calls. Which option BEST describes Dan's first step to remedy this problem?

1

Hold a telephone etiquette training course for upper management.

2

Check the latency configuration. Latency under 250 milliseconds is not recommended.

3

Check to see if the VoIP server is in the cloud.

4

Check the latency configuration. Latency should be set between 75 and 150 milliseconds.

19

Multiple Choice

Dan, a network administrator, has noticed a consistent increase in bandwidth consumption since installing a new VoIP system. The increase is outside of the parameters given by the vendor. What is MOST likely the issue Dan needs to address?

1

The hard phones need to be replaced.

2

The codec needs to be replaced with a more efficient one.

3

VoIP phones should be limited to necessary personnel only.

4

His ISP needs to give him more bandwidth.

20

Multiple Choice

VoIP uses several protocols. Which layer of the OSI model do these protocols reside on?

1

Physical

2

Transport

3

Data Link

4

Presentation

21

Multiple Choice

What is the MOST common Transport layer protocol that VoIP uses?

1

TCP

2

SMTP

3

FTP

4

UDP

22

Multiple Choice

Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform.

Which of the following systems should you recommend?

1

Voice over IP

2

PSTN

3

Unified communications

4

Quality of Service

23

Multiple Select

Which of the following are advantages of virtualization? (Select two.)

1

Centralized administration.

2

Reduced utilization of hardware resources.

3

Easy system migration to different hardware.

4

Improved detection of host-based attacks.

5

Redundancy of hardware components for fault tolerance.

24

Multiple Choice

Which hardware components are controlled by the hypervisor?

1

RAM, power supply, motherboard

2

CPU, storage, power supply

3

Storage, CPU, GPU

4

RAM, CPU, storage

25

Multiple Choice

John is using a host machine with a Type1 hypervisor. He has 40 virtual servers using unmodified guest OSs. Which type of virtualization BEST describes this configuration?

1

Partial virtualization

2

Paravirtualization

3

Regular Type 2 virtualization

4

Full virtualization

26

Multiple Choice

How many types of full virtualization are there?

1

Four

2

Two

3

Three

4

One

27

Multiple Choice

In virtualization, what is the role of a hypervisor?

1

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

2

A hypervisor is a software implementation that executes programs like a physical machine.

3

A hypervisor has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, and motherboard.

4

A hypervisor is created within the host operating system and simulates a hard disk for the virtual machine.

28

Multiple Choice

Which of the following BEST describes an enterprise-level hypervisor?

1

Type 2

2

VM

3

VHD

4

Type 1

29

Multiple Choice

Amber's employer has asked her to research what is needed to best utilize current assets in creating a scalable network. Amber knows that the company has two very robust servers. What is her BEST solution?

1

Sell the current assets and purchase specially made Type 2 hypervisor servers for virtualization.

2

Convert the current servers to host servers using Type 2 hypervisors.

3

Convert the existing servers into host servers for virtualization using a Type 1 hypervisor.

4

Do nothing since everything is moving to the cloud.

30

Multiple Choice

Which hypervisor is for bare metal use?

1

Hyper-V

2

Type 1

3

VMWare

4

Type 2

31

Multiple Choice

Which form of virtualization does not virtualize the hardware?

1

Paravirtualization

2

Full virtualization

3

Partial virtualization

4

Hypervisor

32

Multiple Choice

Which resource is nearly impossible to decrease once allocated in virtualization?

1

CPU

2

NIC

3

RAM

4

Storage

33

Multiple Choice

You want to be able to monitor and filter VM-to-VM traffic within a virtual network.

What should you do?

1

Route VM-to-VM traffic through a physical firewall and back to the virtual network.

2

Implement a virtual firewall within the hypervisor.

3

Create a virtual router with VRF technology.

4

Define VLAN memberships on each VM.

34

Multiple Select

Which of the following statements are true about virtual NICs? (Select two.)

1

Virtual NICs don't have a MAC address.

2

Multiple virtual NICs can be added to a virtual machine.

3

The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated.

4

Virtual NICs need the appropriate driver to function.

5

Virtual NICs can only communicate with other virtual NICs.

35

Multiple Choice

Which key advantage does a virtual router have over a physical router?

1

It has faster routing performance.

2

Multiple networks can connect to a single interface.

3

It allows Virtual Router Redundancy Protocol (VRRP).

4

Routing protocols are not necessary for routing data between networks.

36

You have configured a virtual network that includes the following virtual components:

  • Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual OS4)

  • One virtual switch

The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.

Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with.

Questions 34/35

​Answers:

media
media

37

Multiple Select

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions.

Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.

To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.

What should you do? (Select two. Each response is one part of the complete solution.)

1

Create a new virtual switch configured for host-only (internal) networking.

2

Connect the virtual network interfaces in the virtual machines to the virtual switch.

3

Create a new virtual switch configured for bridged (external) networking.

4

Disconnect the network cable from the hypervisor's network interface.

5

Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces.

38

Multiple Select

You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working.

To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations.

Currently, none of your test virtual machines has a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates.

What should you do? (Select two. Each response is one part of the complete solution.)

1

Connect the virtual network interfaces in the virtual machines to the virtual switch.

2

Create a new virtual switch configured for host-only networking.

3

Disable the switch port that the hypervisor's network interface is connected to.

4

Create a new virtual switch configured for bridged (external) networking.

5

Create a new virtual switch configured for internal networking.

39

Multiple Choice

Which component is MOST likely to allow physical and virtual machines to communicate with each other?

1

Host operating system

2

Virtual desktop

3

VHD

4

Virtual switch

40

Multiple Choice

You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?

1

Virtual desktops

2

Network as a Service (NaaS)

3

Virtual networks

4

Virtual servers

41

Multiple Choice

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network.

Last week, you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discovered that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network.

You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events.

Which solution should you implement to protect the network while also allowing operations to continue as normal?

1

Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection.

2

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

3

Implement a host-based firewall on each Windows 2000 workstation and configure Windows to automatically download and install updates.

4

Install antivirus software on the Windows 2000 workstations and configure Windows to automatically download and install updates.

42

Multiple Select

Which of the following are true regarding cloud computing? (Select three.)

1

Cloud computing requires end user knowledge of the delivery system's physical location and configuration.

2

The term cloud is used as a synonym for the internet.

3

Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet.

4

Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser.

43

Match each description on the right with the appropriate cloud technology on the left.

Question 42 (Part 1)

Answer Choices

- Provides cloud services to just about anyone.

- Provides cloud services to a single organization.

- Integrates one cloud service with other cloud services.

- Allows cloud services to be shared by several organizations.

Boxes

Public Cloud [ ]

Private Cloud [ ]

Community Cloud [ ]

Hybrid Cloud [ ]

44

Match each description on the right with the appropriate cloud technology on the left.

Question 42 (Part 2)

Answers

Public Cloud [ Provides cloud services to just about anyone. ]

Private Cloud [ Provides cloud services to a single organization. ]

Community Cloud [ Allows cloud services to be shared by several organizations. ]

Hybrid Cloud [ Integrates one cloud service with other cloud services. ]

45

Multiple Choice

You were recently hired by a small startup company. The company is in a small office and has several remote employees.

You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power.

Which cloud service model should you use?

1

IaaS

2

SaaS

3

PaaS

4

DaaS

46

Multiple Choice

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?

1

SaaS

2

DaaS

3

IaaS

4

PaaS

47

Multiple Select

Which of the following are benefits that a VPN provides? (Select two.)

1

Compatibility

2

Easy setup

3

Faster connection

4

Metering

5

Cost savings

48

Multiple Choice

Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site?

1

Site-to-site IPsec VPN

2

SSL VPN

3

Remote access VPN

4

GRE over IPsec

49

Multiple Choice

What is a VPN (virtual private network) primarily used for?

1

Allow remote systems to save on long distance charges.

2

Allow the use of network-attached printers.

3

Support secure communications over an untrusted network.

4

Support the distribution of public web documents.

50

Multiple Select

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

1

EPS

2

AH

3

SSL

4

ESP

5

L2TP

51

Multiple Choice

Which other service is IPsec composed of, in addition to AH?

1

Extended Authentication Protocol (EAP)

2

Encapsulating Security Payload (ESP)

3

Encryption File System (EFS)

4

Advanced Encryption Standard (AES)

52

Multiple Select

Which of the following are IPsec modes of operation? (Select two.)

1

Single mode

2

Transport mode

3

Tunnel mode

4

Secure mode

5

Multimode

53

Multiple Select

What are two major concerns regarding IoT devices? (Select two.)

1

Hacking

2

Privacy

3

Short life span

4

Availability

5

Accessibility

54

Multiple Choice

You notice that a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.

Which of the following labels applies to this growing ecosystem of smart devices?

1

Internet of Things (IoT)

2

The smartnet

3

Dynamic environment

4

Internet of smart devices

55

Multiple Choice

Which of the following is considered part of a smart home?

1

Telephone

2

TV

3

Thermostat

4

Laptop

56

Multiple Select

Which of the following are examples of newer devices that are often automated using IoT technology? (Select three.)

1

Printers

2

Home appliances

3

Computer monitors

4

Streaming media devices

5

Security systems

57

Match each smart device with its description.

Question 55 (Part 1)

Answer Choices

- Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.

- Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals.

- Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off.

- Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart.

- Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage.

- Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device.

- Uses voice recognition software and activates through a Wake Word or Hot Word.

Boxes

Thermostat [ ]

Switch [ ]

Bulb [ ]

Plug [ ]

Security Camera [ ]

Door lock [ ]

Speaker/Digital Assistant [ ]

58

Match each smart device with its description.

Question 55 (Part 2)

Answers

Thermostat [ Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. ]

Switch [ Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. ]

Bulb [ Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. ]

Plug [ Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart. ]

Security Camera [ Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. ]

Door lock [ Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. ]

Speaker/Digital Assistant [ Uses voice recognition software and activates through a Wake Word or Hot Word. ]

59

Multiple Choice

Which frequencies does Zigbee operate on?

1

2.4 GHz, 500 MHz, and 818 MHz

2

2.7 GHz, 400 MHz, and 865 MHz

3

2.4 GHz, 900 MHz, and 868 MHz

4

1.4 GHz, 90 MHz, and 500 MHz

60

Multiple Choice

Anabel purchased a smart speaker. She connected it to all the smart devices in her home. Which of the following communication models is she using?

1

Back-end data-sharing

2

Device-to-gateway

3

Device-to-device

4

Device-to-cloud

61

Multiple Choice

What is the maximum number of nodes Z-Wave allows on its mesh network?

1

223

2

231

3

232

4

322

62

Multiple Select

What are the two protocols used most often with IoT devices? (Select two.)

1

Zerg

2

Zigbee

3

Z-Wave

4

Zensys

5

Zbot

63

Multiple Choice

What are the four primary systems of IoT technology?

1

Devices, data storage, remote control, and internet

2

Devices, sensors, apps, and internet

3

Devices, gateway, sensors, and apps

4

Devices, gateway, data storage, and remote control

Chapter 8

Specialized Networks

Show answer

Auto Play

Slide 1 / 63

SLIDE