-
Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()
A . Limited in a single building, a group of buildings, or even a single room
B . Crosses metropolitan, regional, or national boundaries
C . Encompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)
D . Connects client devices wireless protocol
-
Which of the following actions should be taken if during a routine maintenance inspection of a centrifugal pump, localized scoring on a pump shaft sleeve is detected?()
A . Correct the cause of the scoring and repair the sleeve or replace with a new one
B . Reassemble the unit and provide more water leak off for proper lubrication
C . Check for parallel alignment of the sleeve radial faces to the sleeve bores
D . Reassemble the unit and adjust the governor to obtain a slower speed
-
Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()
A . Ensuring compliance with legal regulations and corporate policies
B . Troubleshooting problem reports
C . Planning for network expansion
D . Providing support to sales and marketing
E . Giving presentations to management
F . Monitoring and tuning network performance
-
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()
A . 90 milliseconds
B . 120 milliseconds
C . 150 milliseconds
D . 240 millisecond
-
What is the goal of QoS in a network? ()
A . prevent packets from being dropped
B . increase available bandwidth
C . reduce hardware errors
D . provide predictable network service
E . eliminate propagation delay
F . eliminate jitter and packet lo
-
Which of the following Class A networks is reserved for "private networks" use only?()
A . network 10.0.0.0
B . network 127.0.0.0
C . network 129.135.0.0
D . network 192.168.0.0
-
A network vulnerability scanner is part of which critical element of network and system security?()
A . host security
B . perimeter security
C . security monitoring
D . policy management
-
What is a characteristic of Network Time Protocol?()
A . NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based on the input time.
B . NTP authentication verifies the source,not the recipient.
C . NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D . Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
E . A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
-
What is a reason for implementing MPLS in a network?()
A . MPLS eliminates the need of an IGP in the core.
B . MPLS reduces the required number of BGP-enabled devices in the core.
C . Reduces routing table lookup since only the MPLS core routers perform routing table lookups.
D . MPLS eliminates the need for fully meshed connections between BGP enabled devices.
-
A network vulnerability scanner is part of which critical element of network and system security?()
A . host security
B . perimeter security
C . security monitoring
D . policy management
-
Which two are effects of connecting a network segment that is running 802.1D to a network segment that is running 802.1w?()
A . the entire network switches to 802.1D and generates BPDUs to determine root bridfe status.
B . A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge comes up
C . The entire network reconverges and a unique root briddge for the 802.1D segment, and a root bridge for the 802.1W segment, is chosen
D . the first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1DCompatibility mode and converts the BPDUs to either 802.1D or 802.1W segments of the network
E . Classic 802.1D timers, Such as forward Delay and Max-age, will only be used as a backup, and will not be necessary if point-to-point links and edge prots are properly identified and set by the administrator.
-
In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown? ()
A . H·323
B . UDP
C . RTP
D . TCP
E . Media Gateway Control Protocol (MGCP)
F . session initiation protocol (SIP)
-
A customer has a 32-core Power 770 with 4 AIX partitions and 2 IBM i partitions. They want to improve network availability and allow for concurrent maintenance. What will support the customer requirement at least cost?()
A . Build the logical partition infrastructure based on 6 or more VLANs.
B . Build the logical partition infrastructure based on two or more IVEs.
C . Build the logical partition infrastructure based on Partition Mobility.
D . Build the logical partition infrastructure based on redundant VIO Servers.
-
Why is QoS important in a converged network?()
A . Because data does not need to arrive intact, so data transfer rates can be variable
B . Because lost voice-data packets must be retransmitted
C . Because voice data packets should arrive quickly and sequentially, and with no lost data
D . Because voice data packets must follow a single dedicated path through the network
-
Maintenance of charts and nautical publications up to date is a statutory requirement under the()Convention.
A、STCW
B、MARPOL
C、SOLAS
D、ISM
-
Which of the following is not a typical maintenance task within a network maintenance model?()
A . Providing technical customer support
B . Changing configurations
C . Updating software
D . Monitoring network performance
E . Replacing hardware
F . Scheduling backu
-
An AIX server will not boot in normal mode and the server must be booted into maintenance mode to rebuild the boot logical volume. A NIM master is not defined in this environment. How is the system booted into maintenance mode to perform this task ()
A . Apply power and when the SMS menus appear press 5 repeatedly to enter a maintenance boot automatically. The system will present a maintenance shell eventually.
B . Boot media such as CDROM or Tape is required to boot into maintenance mode. When inserted into the proper device the system automatically boots into maintenance mode when it can not boot into normal mode.
C . Apply power and the server automatically boots into maintenance mode where you can select your disk to rebuild the boot logical volume.
D . Boot media such as CDROM or Tape is required and an administrator must select the proper SMS menus to get into maintenance mode.
-
A user complains that the network printer is not printing. The system administrator knows there is a print queue for the network printer and needs to check on the queue. Which command is run?()
A . netstat
B . lpstat
C . telinit
D . prtconf&e
-
In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown?()
A . H323
B . UDP
C . RTP
D . TCP
E . Media Gateway Control Protocol (MGCP)
F . session initiation protocol (SIP)&e
-
Which two of the following options are categories of Network Maintenance tasks?()
A . Firefighting
B . Interrupt-driven
C . Policy-based
D . Structured
E . Foundational
-
Less wastage as well as reduced maintenance and repair costs is a prominent factor in staff training.
-
Miguel's perplexity is understandable-he's an all-purpose maintenance man at a mid-town-Manhattan residential building.
A.all out
B.versatile
C.prolific
D.capable
-
Software maintenance is to do necessary modification, supplement, and completeness during software life circle.Among the following vary kinds of maintenance, which one has the maximum workload in a general way?
A.relevance maintenance
B.completeness maintenance
C.correctness maintenance
D.other kinds of maintenance
-
In any wireless networking setup, security is a concern. Bluetooth technology is no ______In any wireless networking setup, security is a concern. Bluetooth technology is no ______.