
Chapter 8 Cybersecurity III
Presentation
•
Computers
•
11th Grade
•
Practice Problem
•
Hard
Aiden Moore
FREE Resource
8 Slides • 55 Questions
1
Chapter 8
Specialized Networks
2
Multiple Choice
Which of the following BEST defines a SAN?
A mid-tier speed switch
A top-of-rack switch
A block-level storage network
A Core layer switch
3
Multiple Choice
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server.
Which network-based storage technology is being used?
iSCSI SAN with clustering
NAS
Fibre Channel SAN
NAS with clustering
4
Multiple Choice
Which of the following are the components of a SAN?
Hosts, storage, and SAN fabric
Distribution switches, targets, and SAN fabric
Access switches, SAN fabric, and hosts
SAN fabric, core switches, and the initiator
5
Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN.
Question 4 (Part 1)
Boxes
Step 1 [ ]
Step 2 [ ]
Step 3 [ ]
Step 4 [ ]
Step 5 [ ]
Answer Choices
- Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN.
- Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.
- Deploy two FC switches.
- Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.
- Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs.
6
Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN.
Question 4 (Part 2)
Answers
Box 1 [ Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN. ]
Box 2 [ Deploy two FC switches. ]
Box 3 [ Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. ]
Box 4 [ Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs. ]
Box 5 [ Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. ]
7
Multiple Choice
Brett has been tasked with creating a new SAN. The company currently has Gigabit internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN. Brett tells the CTO that this will not work. Which of the following BEST describes the problem?
Fibre Channel over Ethernet requires 10 Gigabit internet.
Fibre Channel over Ethernet is still only conceptual.
Fibre Channel over Ethernet requires all new, specialized equipment.
Fibre Channel over Ethernet is slower than iSCSI.
8
Multiple Choice
What BEST describes the designed purpose of InfiniBand?
Unlimited 10 Gigabit internet
Cloud platforms
High-performance supercomputers
Jumbo frames
9
Multiple Choice
You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
iSCSI option under File and Storage Services in Server Manager
Multipath I/O
iSCSI Initiator
Internet Storage Name Service
10
Multiple Choice
Within an SDN, what is commonly referred to as the brains?
Hosts
Initiators
Fabric
Controllers
11
Multiple Choice
Which option BEST describes the third layer in the SDN architecture?
Control
Management
Application
Infrastructure
12
Multiple Choice
What are the three layers of an SDN?
Software, Management, and Construction
SaaS, IaaS, and PaaS
Application, Control, and Infrastructure
Physical, Control, and Virtualized
13
Multiple Choice
Which of the following BEST describes the main purpose of the codec used in VoIP?
An algorithm that exclusively controls sound quality.
An algorithm for external calls to be made over VoIP.
An algorithm to control poor quality transmissions.
An algorithm to compress data in order to save on bandwidth.
14
Multiple Choice
Which of the following BEST describes VoIP (Voice over Internet Protocol)?
A protocol optimized for voice data transmission (telephone calls) through a wireless network.
A protocol optimized for voice data transmission (telephone calls) through a 5G switched IP network.
A series of protocols optimized for voice (telephone calls) and digital data transmission through a packet-switched IP network.
A protocol optimized for voice data transmission (telephone calls) through a packet-switched IP network.
15
Multiple Choice
Which of the following are considered VoIP endpoints?
Hard phones and soft phones
Soft phones and PBX
Satellite phones and soft phones
Hard lines and cell phones
16
Multiple Choice
Larry is tasked with implementing a VoIP system in the office. He presents his research to his boss, who wants to use the current hard phones to save money. What BEST explains why this is not possible?
Hard phones don't conform to IEEE 805.3.
The old phones don't provide conferencing, but VoIP hard lines do.
Regular hard phones only work with SNMP, and VoIP hard phones use UDP and TCP.
A hard phone does not have the internal computing parts to accept VoIP transmissions.
17
Multiple Choice
Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference?
Jitter is the up and down variation in latency.
Latency is the up and down variation in jitter.
Jitter is caused by an inadequate codec.
Latency is caused by sampling; jitter is not.
18
Multiple Choice
Dan, a network administrator, gets an email from the CEO. She is upset because people keep talking over each other on conference calls. Which option BEST describes Dan's first step to remedy this problem?
Hold a telephone etiquette training course for upper management.
Check the latency configuration. Latency under 250 milliseconds is not recommended.
Check to see if the VoIP server is in the cloud.
Check the latency configuration. Latency should be set between 75 and 150 milliseconds.
19
Multiple Choice
Dan, a network administrator, has noticed a consistent increase in bandwidth consumption since installing a new VoIP system. The increase is outside of the parameters given by the vendor. What is MOST likely the issue Dan needs to address?
The hard phones need to be replaced.
The codec needs to be replaced with a more efficient one.
VoIP phones should be limited to necessary personnel only.
His ISP needs to give him more bandwidth.
20
Multiple Choice
VoIP uses several protocols. Which layer of the OSI model do these protocols reside on?
Physical
Transport
Data Link
Presentation
21
Multiple Choice
What is the MOST common Transport layer protocol that VoIP uses?
TCP
SMTP
FTP
UDP
22
Multiple Choice
Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform.
Which of the following systems should you recommend?
Voice over IP
PSTN
Unified communications
Quality of Service
23
Multiple Select
Which of the following are advantages of virtualization? (Select two.)
Centralized administration.
Reduced utilization of hardware resources.
Easy system migration to different hardware.
Improved detection of host-based attacks.
Redundancy of hardware components for fault tolerance.
24
Multiple Choice
Which hardware components are controlled by the hypervisor?
RAM, power supply, motherboard
CPU, storage, power supply
Storage, CPU, GPU
RAM, CPU, storage
25
Multiple Choice
John is using a host machine with a Type1 hypervisor. He has 40 virtual servers using unmodified guest OSs. Which type of virtualization BEST describes this configuration?
Partial virtualization
Paravirtualization
Regular Type 2 virtualization
Full virtualization
26
Multiple Choice
How many types of full virtualization are there?
Four
Two
Three
One
27
Multiple Choice
In virtualization, what is the role of a hypervisor?
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
A hypervisor is a software implementation that executes programs like a physical machine.
A hypervisor has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, and motherboard.
A hypervisor is created within the host operating system and simulates a hard disk for the virtual machine.
28
Multiple Choice
Which of the following BEST describes an enterprise-level hypervisor?
Type 2
VM
VHD
Type 1
29
Multiple Choice
Amber's employer has asked her to research what is needed to best utilize current assets in creating a scalable network. Amber knows that the company has two very robust servers. What is her BEST solution?
Sell the current assets and purchase specially made Type 2 hypervisor servers for virtualization.
Convert the current servers to host servers using Type 2 hypervisors.
Convert the existing servers into host servers for virtualization using a Type 1 hypervisor.
Do nothing since everything is moving to the cloud.
30
Multiple Choice
Which hypervisor is for bare metal use?
Hyper-V
Type 1
VMWare
Type 2
31
Multiple Choice
Which form of virtualization does not virtualize the hardware?
Paravirtualization
Full virtualization
Partial virtualization
Hypervisor
32
Multiple Choice
Which resource is nearly impossible to decrease once allocated in virtualization?
CPU
NIC
RAM
Storage
33
Multiple Choice
You want to be able to monitor and filter VM-to-VM traffic within a virtual network.
What should you do?
Route VM-to-VM traffic through a physical firewall and back to the virtual network.
Implement a virtual firewall within the hypervisor.
Create a virtual router with VRF technology.
Define VLAN memberships on each VM.
34
Multiple Select
Which of the following statements are true about virtual NICs? (Select two.)
Virtual NICs don't have a MAC address.
Multiple virtual NICs can be added to a virtual machine.
The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated.
Virtual NICs need the appropriate driver to function.
Virtual NICs can only communicate with other virtual NICs.
35
Multiple Choice
Which key advantage does a virtual router have over a physical router?
It has faster routing performance.
Multiple networks can connect to a single interface.
It allows Virtual Router Redundancy Protocol (VRRP).
Routing protocols are not necessary for routing data between networks.
36
You have configured a virtual network that includes the following virtual components:
Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual OS4)
One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with.
Questions 34/35
Answers:
37
Multiple Select
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions.
Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.
To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Each response is one part of the complete solution.)
Create a new virtual switch configured for host-only (internal) networking.
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Create a new virtual switch configured for bridged (external) networking.
Disconnect the network cable from the hypervisor's network interface.
Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces.
38
Multiple Select
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working.
To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations.
Currently, none of your test virtual machines has a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates.
What should you do? (Select two. Each response is one part of the complete solution.)
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Create a new virtual switch configured for host-only networking.
Disable the switch port that the hypervisor's network interface is connected to.
Create a new virtual switch configured for bridged (external) networking.
Create a new virtual switch configured for internal networking.
39
Multiple Choice
Which component is MOST likely to allow physical and virtual machines to communicate with each other?
Host operating system
Virtual desktop
VHD
Virtual switch
40
Multiple Choice
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
Virtual desktops
Network as a Service (NaaS)
Virtual networks
Virtual servers
41
Multiple Choice
Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network.
Last week, you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discovered that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network.
You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events.
Which solution should you implement to protect the network while also allowing operations to continue as normal?
Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection.
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.
Implement a host-based firewall on each Windows 2000 workstation and configure Windows to automatically download and install updates.
Install antivirus software on the Windows 2000 workstations and configure Windows to automatically download and install updates.
42
Multiple Select
Which of the following are true regarding cloud computing? (Select three.)
Cloud computing requires end user knowledge of the delivery system's physical location and configuration.
The term cloud is used as a synonym for the internet.
Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet.
Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser.
43
Match each description on the right with the appropriate cloud technology on the left.
Question 42 (Part 1)
Answer Choices
- Provides cloud services to just about anyone.
- Provides cloud services to a single organization.
- Integrates one cloud service with other cloud services.
- Allows cloud services to be shared by several organizations.
Boxes
Public Cloud [ ]
Private Cloud [ ]
Community Cloud [ ]
Hybrid Cloud [ ]
44
Match each description on the right with the appropriate cloud technology on the left.
Question 42 (Part 2)
Answers
Public Cloud [ Provides cloud services to just about anyone. ]
Private Cloud [ Provides cloud services to a single organization. ]
Community Cloud [ Allows cloud services to be shared by several organizations. ]
Hybrid Cloud [ Integrates one cloud service with other cloud services. ]
45
Multiple Choice
You were recently hired by a small startup company. The company is in a small office and has several remote employees.
You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power.
Which cloud service model should you use?
IaaS
SaaS
PaaS
DaaS
46
Multiple Choice
Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?
SaaS
DaaS
IaaS
PaaS
47
Multiple Select
Which of the following are benefits that a VPN provides? (Select two.)
Compatibility
Easy setup
Faster connection
Metering
Cost savings
48
Multiple Choice
Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site?
Site-to-site IPsec VPN
SSL VPN
Remote access VPN
GRE over IPsec
49
Multiple Choice
What is a VPN (virtual private network) primarily used for?
Allow remote systems to save on long distance charges.
Allow the use of network-attached printers.
Support secure communications over an untrusted network.
Support the distribution of public web documents.
50
Multiple Select
IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)
EPS
AH
SSL
ESP
L2TP
51
Multiple Choice
Which other service is IPsec composed of, in addition to AH?
Extended Authentication Protocol (EAP)
Encapsulating Security Payload (ESP)
Encryption File System (EFS)
Advanced Encryption Standard (AES)
52
Multiple Select
Which of the following are IPsec modes of operation? (Select two.)
Single mode
Transport mode
Tunnel mode
Secure mode
Multimode
53
Multiple Select
What are two major concerns regarding IoT devices? (Select two.)
Hacking
Privacy
Short life span
Availability
Accessibility
54
Multiple Choice
You notice that a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
Internet of Things (IoT)
The smartnet
Dynamic environment
Internet of smart devices
55
Multiple Choice
Which of the following is considered part of a smart home?
Telephone
TV
Thermostat
Laptop
56
Multiple Select
Which of the following are examples of newer devices that are often automated using IoT technology? (Select three.)
Printers
Home appliances
Computer monitors
Streaming media devices
Security systems
57
Match each smart device with its description.
Question 55 (Part 1)
Answer Choices
- Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.
- Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals.
- Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off.
- Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart.
- Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage.
- Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device.
- Uses voice recognition software and activates through a Wake Word or Hot Word.
Boxes
Thermostat [ ]
Switch [ ]
Bulb [ ]
Plug [ ]
Security Camera [ ]
Door lock [ ]
Speaker/Digital Assistant [ ]
58
Match each smart device with its description.
Question 55 (Part 2)
Answers
Thermostat [ Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. ]
Switch [ Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. ]
Bulb [ Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. ]
Plug [ Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart. ]
Security Camera [ Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. ]
Door lock [ Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. ]
Speaker/Digital Assistant [ Uses voice recognition software and activates through a Wake Word or Hot Word. ]
59
Multiple Choice
Which frequencies does Zigbee operate on?
2.4 GHz, 500 MHz, and 818 MHz
2.7 GHz, 400 MHz, and 865 MHz
2.4 GHz, 900 MHz, and 868 MHz
1.4 GHz, 90 MHz, and 500 MHz
60
Multiple Choice
Anabel purchased a smart speaker. She connected it to all the smart devices in her home. Which of the following communication models is she using?
Back-end data-sharing
Device-to-gateway
Device-to-device
Device-to-cloud
61
Multiple Choice
What is the maximum number of nodes Z-Wave allows on its mesh network?
223
231
232
322
62
Multiple Select
What are the two protocols used most often with IoT devices? (Select two.)
Zerg
Zigbee
Z-Wave
Zensys
Zbot
63
Multiple Choice
What are the four primary systems of IoT technology?
Devices, data storage, remote control, and internet
Devices, sensors, apps, and internet
Devices, gateway, sensors, and apps
Devices, gateway, data storage, and remote control
Chapter 8
Specialized Networks
Show answer
Auto Play
Slide 1 / 63
SLIDE
Similar Resources on Wayground
56 questions
The Great War
Presentation
•
11th Grade
57 questions
Plant Cell Types
Presentation
•
11th Grade
58 questions
Q1W4 ES Fossil Fuels
Presentation
•
11th Grade
53 questions
Cell Cycle
Presentation
•
11th Grade
59 questions
Past Perfect - 2ª série
Presentation
•
11th Grade
57 questions
Unit 9 Collocation/Future in the past
Presentation
•
11th Grade
58 questions
Chapter 29: Nervous and Endocrine system
Presentation
•
10th Grade
59 questions
11G EOT Unit 1 Grammar
Presentation
•
11th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
Grammar
Quiz
•
9th - 12th Grade
31 questions
Easter Trivia
Quiz
•
KG - 12th Grade
16 questions
Circles - Equations, Central & Inscribed Angles
Quiz
•
9th - 12th Grade
46 questions
Unit 4 Geosphere Test Review
Quiz
•
9th - 12th Grade
25 questions
Early Cold War Quizziz
Quiz
•
11th Grade
10 questions
Climate Change and Its Impact
Interactive video
•
9th - 12th Grade
35 questions
Venn Diagrams, Theoretical, & Experimental Review
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade