CORRECT SOLUTIONS TESTED AND
APPROVED!!!
How many collision domains do the switch with 12 ports have?
A. None
B. 1
C. 2
D. 12
--ANSWER-- D. 12
Which of the following protocols is used for transferring files with a remote
host in a non-secure fashion and without requiring user credentials?
A. SFTP B. SSH
C. TFTP
D. SCP
--ANSWER-- C. TFTP
Page 1 of 70
,Which of these components is used to make virtualization possible in the server
environment by permitting multiple systems to use the underlying hardware of
the host system?
A. vNIC
B. vSwitch
C. SD-WAN
D. Hypervisor
--ANSWER-- D. Hypervisor
Which of the following IDS/IPS detection methods watches network traffic
patterns over a period of time and dynamically builds a baseline?
A. Signature-based
B. Policy-based
C. Statistical anomaly
D. Non-statistical anomoly
--ANSWER-- C. Statistical anomaly
Which of following statements are true of an Ethernet hub?
Each correct answer represents a complete solution. Choose all that apply.
Page 2 of 70
,A. CSMA/CD needs to run on all attached devices
B. All connections need to be full-duplex
C. All connections need to be half-duplex
D. Attached devices do not need to run CSMA/CD
A. CSMA/CD needs to run on all attached devices and C. All connections need
to be half---ANSWER-- duplex.
What is the distance limitation of a 1000BASE-T Ethernet network?
A. 100m
B. 185m
C. 500m
D. 200m
--ANSWER-- A. 100m
Which network infrastructure device primarily makes forwarding decisions
based on layer 2 MAC addresses?
A. Router
B. Switch
C. Hub
Page 3 of 70
, D. Multilayer switch
--ANSWER-- B. Switch
Which global hierarchical system is used to resolve names to IP addresses?
A. TFTP
B. DHCP
C. NTP
D. DNS
--ANSWER-- D. DNS
The Network Layer of the OSI model corresponds to what layer of the TCP/IP
Stack?
A. Application
B. Network Interface
C. Internet
D. Transport
--ANSWER-- C. Internet
Page 4 of 70