Telecom - Lecture notes 1-7 PDF

Title Telecom - Lecture notes 1-7
Course Telecommunications And Networking Essentials
Institution Arkansas State University
Pages 10
File Size 120.5 KB
File Type PDF
Total Downloads 49
Total Views 129

Summary

Telecom - Lecture notes 1-7...


Description

Which VoIP device helps establish the connection between two VoIP phones? VoIP server What are other names fr a VoIP server IP-PBX VoIP PBX What is one benefit of placing VoIP gateways in geographically separated branch offices that have an existing WAN connection? Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred When would you consider changing the codec used in your VoIP system? When VoIP data consumes too large a portion of your network bandwidth. When sound quality is poor. How can QoS be configured so that large data transfers will not block VoIP calls by using too much network bandwidth? QoS can be configured on network devices to give priority to VoIP traffic. Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend? Unified communication Which of the following protocols is an open source protocol used by most manufacturers of VoIP systems? Session initiation protocol (SIP) Which of the following protocols are used by VoIP to set up, maintain, and terminate a phone call? SIP Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system? Jitter You are on a phone call using VoIP. You notice that it takes several seconds for the person on the other end to respond to questions you ask. Which type of problem is occurring? Latency What is a soft phone? A software application that runs on a computer or other device that accesses a VoIP server to make real-time phone calls.

Which switch features are typically used with VoIP? Power over Ethernet (PoE) Virtual LAN (VLAN) Which of the following features is used with digital IP phones to supply power through a switch port? Power over Ethernet (PoE) In virtualization, what is the role of a hypervisor? A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. What type of virtualization completely simulates a real physical host? Full Virtualization Which component is most likely to allow physical and virtual machines to communicate with each other? Virtual switch Which of the following are advantages of virtualization? Centralized administration Easy migration of systems to different hardware You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual servers You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Flexibility - Moving virtual machines between hypervisor hosts Testing - Verifying that security controls are working as designed Server consolidation - Performing a physical-to-virtual migration (P2V) Sandboxing - Isolating a virtual machine from the physical network You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working.

To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. Create a new virtual switch configured for bridged (external) networking Connect the virtual network interfaces in the virtual machine to the virtual switch What key advantage does a virtual router have over a physical router? Multiple networks can be connected to a single interface. You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Implement a virtual firewall within the hypervisor. Which of the following statements about virtual NICs are true? Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine. Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network? SaaS Which of the following best describes the Platform as a Service (PaaS) cloud computing service model? PaaS delivers everything a developer needs to build an application onto the cloud infrastructure Which of the following is NOT true regarding cloud computing? Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services. You were hired by a small start-up company. the company is in a small office and has several remote employees. You ave been asked to find a business service that would accommodate the curren size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud serve model should you use? IaaS You are in the process of configuring an iSCSI storage area network (SAN) for your network.... Which tool should you use? iSCSI Initiator Arrange the Fibre Channel SAN implementations tasks in the order they should be performed. Step 1- Install a Fibre Channel adapter in each server that will access the shared storage on the SAN.

Step 2- Deploy a Fibre Channel switch. Step 3- Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using. Step 4- Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives Which of the following does NOT accurately describe an iSCSI SAN? Requires special hardware and knowledge to implement. you manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used? NAS with Clustering. Which of the following are typical components of a NAS device? select two A minimal network OS. One or more NICs. In a SAN implementation, the servers that connect to shared storage devices are called___________________. initiators An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device? Hub uses a narrow FHSS Breaks data into pieces DSSS Breaks data into very small data OFDM Which of the following is true of a wireless network SSID? Groups wireless devices together into the same logical network Which wireless networking component is used to correct multiple APs together? DS All of the 802.11 standards for the wireless networking support which type of communication path sharing technology? CSMA/CA What is the frequency of 802.11a networking? 5.75GHz

802.11 b and 802.11g 2.4 GHz and 11 channels How many total channels are available for 802.11a wireless networks? 23 Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building - A wireless television distribution - A wireless phone system running at 5.8 GHz - A wireless phone system running at 900 MHz - An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency - An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range The wireless TV system

Which of the following are frequencies defined by 802.11 committees for wireless networking? 2.4 GHz 5.75 GHz Which IEEE standard describes wireless communication? 802.11b Which data transmissions rate is defined by the IEEE 802.11b wireless standard? 11 Mbps 802.11a – 2 Mbps 802.11g – 56 Mbps 802.3 – 10 Mbps You are dragging a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? 802.11a (54 Mbps same as 802.11g but g operates in 2.4Ghz and a in 5.725) You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run at 54 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period.

Which 802.11 standard will work best in this situation? 802.11n Which IEEE wireless standards specify transmission speeds up to 54 Mbps? 802.11g 802.11a

You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 1200 feet, uses a frequency range of 5 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend? 802.11n Which technologies are used by 802.11ac standard to increase network bandwidth? Eight MIMO radio streams 60 MHz bonded channels You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue? Network bridge You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? Same SSID, different channel You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do? Decrease the beacon interval You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do? Configure a profile on the wireless client.

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.) TKIP encryption Preshared key What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment? They are vulnerable to exploits due to weaker security. Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate? Z-Wave to optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: • Non-overlapping • Low utilization • Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results, which channel should you configure your wireless AP to use? Channel 1 your wireless network consists of multiple 802.11n access points that are configured as follows: • SSID (hidden): CorpNet • Security: WPA2-PSK using AES • Frequency: 5.7 GHz • Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do? Double the bandwidth assigned per channel to 40 MHz. You are designing an update to your client's wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?

802.11n You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? 802.11n ou are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards will work best in this situation? (Select two.) 802.11 n and a you have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.) What type of data will be transmitted on the network? Is the size of the business expected to grow in the future? How many devices will need to be supported? What purposes does a wireless site site survey fulfill? (Choose two.) To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points. Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of quest WLANs for keeping public wireless traffic separated from private traffic? Distributed wireless mesh infrastructure https://quizlet.com/149219969/1055-practice-exam-flash-cards/ Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, and WPA2 Personal What is the LEAST secure place to locate an access point with an omni-directional antenna when creating a wireless cell? Near a window Which of the following measures will make your wireless network inviable to the casual attacker performing war driving? Disable the SSID broadcast Which of the following provides security for wireless networks? WPA2.

which of the following features are supplied by WPA2 on a wireless network? Encryption You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.) AES encryption & 802.1x You want to implement 802.1x authentication on your wireless network. Which of the following will be required> RADIUS You are the wireless network Admin for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.11x authentication instead of pre-shared keys. What should you do Configure all wireless access points with client certs. Configure the RADIUS server with a server cert. ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two.) High-gain & Directional Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. What type of security risk is this? Rogue access point You want to connect your client computer to a wireless access point connected to your wired network air work. The network Admin tells you that the access point is configured to use WPA2 personal with the strongest encryption method possible. SSID broadcast is ruined off. Which of the following must you configure manually on the client. select three SSID AES Preshared Key Which of the following protocols or mechanisms is not used to provide security on a wireless network? RDP Which of the following recommendations should you follow when placing wireless access points (WAPs) to provide wireless access for users within your company building?

Place WAP's above where most clients are. OC-3 155 Mbps 1- 51.85 12- 622 24- 1.2544 Gbps 48- 2.488 192- 9.9...


Similar Free PDFs