Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
A network card is not functioning properly. The card was purchased three years ago. You discover that the firmware is outdated and requires an upgrade. You call the vendor, but he refuses to provide an update. What is the reason for the refusal?
CorrectIncorrect -
Question 2 of 20
2. Question
Which of the following information is not included in baselines for networks and networked devices?
CorrectIncorrect -
Question 3 of 20
3. Question
You are configuring network alerts. You want a protocol that provides a descriptive error message in case of a problem with the authentication or authorization process. Which SNMP version is most suitable in this scenario?
CorrectIncorrect -
Question 4 of 20
4. Question
Which method was introduced by SNMPv3 as a replacement for the community string method?
CorrectIncorrect -
Question 5 of 20
5. Question
To what type of system do NetFlow-supported routers and switches initially export the collected flow data from all NetFlow-enabled interfaces?
CorrectIncorrect -
Question 6 of 20
6. Question
How does the baseline anomaly detection and monitoring system identify an event where performance falls below the baseline and alert the concerned personnel?
CorrectIncorrect -
Question 7 of 20
7. Question
What does SIEM do after discovering an issue besides collecting valuable data and assessing the aggregated logs in real-time?
CorrectIncorrect -
Question 8 of 20
8. Question
Why is it crucial to use port mirroring at strategic times and only for short periods?
CorrectIncorrect -
Question 9 of 20
9. Question
You are troubleshooting the leading network due to slow browsing response time. Which tools allow you to determine which router or switch creates a network bottleneck?
CorrectIncorrect -
Question 10 of 20
10. Question
You have an e-commerce server that processes an average of $1000 transactions per hour. Last time, the team was unaware of the server’s downtime, which caused tremendous loss. Which monitoring system can keep a running tally of the down services by calculating the outages and displaying the network’s total uptime?
CorrectIncorrect -
Question 11 of 20
11. Question
How can Mean Time To Repair (MTTR) used in SLAs allow IT operations to ensure that the time taken to repair a component or device will not be a factor that causes them to violate the SLAs?
CorrectIncorrect -
Question 12 of 20
12. Question
Which of the following is the correct way to calculate the Mean Time Between Failure (MTBF) and the total time it takes to get the device fixed and back online?
CorrectIncorrect -
Question 13 of 20
13. Question
You have been tasked with creating a disaster recovery plan. While looking for a leased space to build a cold and a warm site, which of the following is considered a drawback of a warm site?
CorrectIncorrect -
Question 14 of 20
14. Question
Active/active increases availability by providing more systems for work. In what way does the active/passive provide fault tolerance?
CorrectIncorrect -
Question 15 of 20
15. Question
Which of the following is NOT included in a Tabletop exercise?
CorrectIncorrect -
Question 16 of 20
16. Question
Systems on an IPv6 network can assign IPv6 addresses to themselves using mechanisms such as DHCPv6 and SLAAC. Which of the following statements about the primary difference between these two mechanisms are true? (Choose two.)
CorrectIncorrect -
Question 17 of 20
17. Question
In what way are Domain Name System Security Extensions (DNSSEC) used to secure data exchanged in the DNS protocol?
CorrectIncorrect -
Question 18 of 20
18. Question
Which DNS extensions provide security for the data exchanged in DNS transactions? (Choose two.)
CorrectIncorrect -
Question 19 of 20
19. Question
You are configuring Google Workspace for a new custom email address with a different domain name. Which of the following DNS records should be updated to host the custom email address in your Google Workspace? (Choose two)
CorrectIncorrect -
Question 20 of 20
20. Question
How does Network Time Security (NTS) allow you to introduce encryption into the time distribution system without increasing latency and affecting the accuracy of the time received?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect