0% found this document useful (0 votes)
27 views9 pages

NCQ09 Asnm

Uploaded by

Zizmara Ndiaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views9 pages

NCQ09 Asnm

Uploaded by

Zizmara Ndiaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Advance Systems and Network Management

Garry has implemented SAN in the data center to ensure that the performance of the LAN is not affected due
to storage traffic. The organization asks Garry to implement a collection of storage devices shared by various
servers in the SAN. The organization also asks Garry to ensure that there should be efficient data transmission
between servers and storage devices in the SAN. However, Chris analyses the SAN and observes that the
storage fabric and various connectivity devices used in the SAN are working properly.
What should Donna do to solve the problem?
1. Implement disaster recovery and storage mirroring techniques in the SAN.
2. Implement tape library and data interchange techniques in the SAN.
3. Implement tape library and disaster recovery techniques in the SAN.
4. Implement storage mirroring and tape library in the SAN.

Which of the following cable transfers voice and digital data at the speed of 20 Mbps?
1. CAT 5 cable
2. CAT 6 cable
3. CAT 2 cable
4. CAT 4 cable

The machines on the LAN need to be arranged to have minimum complexity in the network and maximum
bandwidth. Also needs to ensure that there is no resource conflict among the clients and servers. In addition,
it may need to expand the network in future and might require wireless technology. What should be the plan
for implementing the network?
1. Should implement wired LAN using fibre optic channels and use transparent bridging, whose
existence is invisible to the users.
2. Should implement a wired LAN using technology like virtual LAN with copper cables to provide
connectivity between devices.
3. Should implement a wired LAN and transparent bridging; use wireless devices on additional servers
that can be installed when the need arises.
4. Should utilize wireless technology based on IrDA where the machines would be connected using
infrared communication so there will be no hassles of using LAN cables.

Ronald receives complaints from the employees of the organization that the operating systems installed on
virtual machines are infected with viruses and have become outdated. He observes that this is a result of
turning off of some of the virtual machines for an extended period. Which method should he use to perform
the above task?
1. Microsoft Loopback Adapter
2. Virtual Machine Remote Control
3. Microsoft Operations Manager
4. System Management Services

Which best practice related to resiliency and backup services involves evaluating the cables used to establish
the enterprise network?
1. Network design
2. Hardware resiliency
3. Network services resiliency
4. Network links

Louis works as a system administrator for the enterprise. Louis is assigned the task to implement a technique
that maintains a record of the state of connections between computers connected to the enterprise network.
Which of the following technique should Jim implement?
1. The Stateful Inspection technique
Advance Systems and Network Management

2. The Proxy Server system


3. The Intrusion Detection system
4. The Packet Filtering technique

Donna is working as a system administrator to provide security to the computers and the network system of
the company, Donna installs virus detection systems in enterprise computers and specifies policies and
procedures for using network services. However, Donna finds that the computers and the network are still
affected by hacker attacks. What should Donna do to solve the problem?
1. Implement virus detection systems, define, and enforce rules for distribution of access controls
2. Implement authentication systems for accessing the network
3. Implement virus detection systems in the system and firewalls on the network
4. Implement intrusion detection and prevention systems in the Network

Which level of storage virtualization technique consolidates the physical attributes, such as data path,
between the storage devices, in an enterprise network?
1. File level
2. Fabric level
3. Storage level
4. Server level

John is working as a network administrator. The management asks John to remove bugs in the software used.
Which component of the enterprise management should John use to perform the above task?
1. PC inventory management
2. Patch management
3. Network monitoring
4. Remote administration

Tech Systems is a leading company in the IT sector. Ronin, the network administrator, is assigned the task to
implement security mechanism that helps identify, log, resolve, and analyze the troubles related to the
systems and networks in an enterprise. What aspect of enterprise management should Ronin consider to
perform the task?
1. Storage Management
2. Problem Management
3. Change Management
4. Facilities Management

David is the network administrator of a medium sized organization. The organization has many departments
that use computers to save data. David needs to connect these computers to share the data of various
departments. David has to ensure that the components that have been used to set up the network in the
organization provide optimum utilization of the bandwidth. What should David do to perform the task?
1. Implement VLAN using switches
2. Implement LAN using routers
3. Implement LAN using hubs
4. Implement VLAN using hubs

Understanding the concept of Enterprise Management and Enterprise Management Tools


1. Syntax
2. Encoding
3. Simple
4. Name
Advance Systems and Network Management

Pat works as a network administrator, receives a new project to establish a wireless network for the Red Sky
IT Systems institute. Pat is assigned the task to establish the wireless network to enable the students to access
relevant information. He implements Wi-Fi technology in the institute. After implementing the wireless
network, Pat receives complaints from the students that it takes a long time to access any data through the
network and the network is susceptible to interferences by cordless phones in the nearby range. What should
he do to solve the problem?
1. Implement the 802.16 standard
2. Implement the 802.11g based network
3. Implement the 802.11a based network
4. Implement the 802.15 standard

Which of the following Protocol Data Unit field in the Simple Network Management Protocol version 1
message associates an error with the corresponding object instance?
1. Variable bindings
2. Error index
3. Request ID
4. Error status

Which component of server virtualization enables the other components of server virtualization to
communicate with each other?
1. Unix server
2. Fibre channel switch
3. Storage system
4. Windows Server

The organization decides to implement a data center. Steve, the network administrator, needs to ensure the
network traffic is efficiently managed, therefore he decides to divide the organization's Local Area Network
into logical networks. In addition, he needs to increase the memory of the computers in the data center by
using hard disk space as a part of the memory. What should Steve do to perform the required tasks?
1. Implement Virtual Local Area Network and virtualization in the organization.
2. Implement transparent bridging and virtualization in the organization.
3. Implement transparent bridging and Direct Attached Storage in the organization.
4. Implement transparent bridging and virtualization in the organization.

Tom is working as the network administrator. He has deployed large servers for data storage and all the
servers are on a Local Area Network (LAN). The servers enable the clients in the LAN to store and retrieve
data. However, at times there is too much network traffic caused by data access requests from clients.
Therefore, Tom needs to reduce the traffic flowing across the LAN. In addition, Tom needs to implement a
network solution that provides efficient data storage and round-the-clock connectivity. What should Tom do
to perform the required tasks?
1. Implement NAS. Employ techniques such as remote administration and server virtualization.
2. Implement a NAS. Use techniques such as firewalls and IDS for securing the network.
3. Deploy a SAN and implement VLAN in the LAN of the data center.
4. Use SAN technology and place routers in such a way ensuring maximum bandwidth to servers.

Tech Book is an online book selling organization, which decides to implement NAS to access data files in its
network. For this, the organization needs to configure Network Attached Storage (NAS) filers in the
organization network. The organization is using disk space Redundant Array of Inexpensive Disks (RAID) group
to store data related to NAS Filer. Pat, the network administrator is assigned the task to migrate complete
data stored in RAID groups of a NAS Filer to another NAS Filer. What should Tom do to perform the task?
Advance Systems and Network Management

1. Implement EMC Celerra data movers


2. Implement NDMP copy
3. Implement EMC Celerra Time Finder; FS
4. Implement Network Appliance SnapMirror

The company, ABC Corp. develops software. To secure the network of the company Tom, the network
administrator, configures an Intrusion Detection System (IDS). Tom has been asked to determine the status of
the patterns, such as the size of the data packet of the network traffic. Which of the following technique
should Tom implement to ensure an alarm rings when the network detects an intrusion?
1. Host based IDS
2. Network based IDS
3. Real time IDS
4. Interval based IDS

To maintain at least 150 e-mail accounts for the users so that users do not find any difficulty in storing e-mail
messages. Which of the following services What should Steve do to solve the problems of the users?
1. Monitor the network of the data center from the network operations center of the data center and
use dedicated hosting services to provide additional storage space to users
2. Monitor the network of the data center from the network operations center and use shared hosting
services to provide additional storage space to users.
3. Monitor the network of the data center from the security operations center of the data center and
use dedicated hosting services to provide additional storage space to users.
4. Monitor the network of the data center from the security operations center of the data center and
use shared hosting services to provide additional storage space to users.

Techno Systems is an organization that develops mobile handsets. The organization needs to develop a
communication method that can enable mobile phones to connect to other mobile devices, such as laptops to
transfer data. The management wants that mobile phones should be able to transfer data to many users at a
time at the frequency of 2.4 Gigahertz. The management assigns this task to Tom, the network administrator.
Tom implements Wi-Fi technology to perform data transfer. However, users complain that the battery backup
of the mobile phones is poor. In addition, the data transfer rate is low. What should Tom do to solve the
problem?
1. Implement VSAT Technology
2. Implement RFID Technology
3. Implement WiMAX Technology
4. Implement Bluetooth Technology

An enterprise provides an appropriate physical environment, such as air conditioners, electrical power, switch
rooms, and routers for the operation of IT infrastructure. What type of management is this ensuring?
1. Facilities Management
2. Problem Management
3. Change Management
4. Storage Management

Which transparent bridge operation sends the frames to all computers connected through the bridge?
1. Aging
2. Flooding
3. Forwarding
4. Learning
Advance Systems and Network Management

Global Inc. company has recently opened a new office at Texas and asks Louis the network administrator to
provide the Internet connection at the new office. Louis needs to decide the bandwidth of the Internet
connection for the new office. Which type of infrastructure management should Louis use to perform the
above task?
1. Facilities Management
2. Capacity Planning
3. Storage Management
4. Problem Management

Tech Systems sets up a data center and the network administrator of the organization Susan manages the
data center. She needs to reduce the complexities involved in using cables in the data center, so that users
can connect their mobile devices, such as laptops to the enterprise network through electromagnetic waves.
The organization wants to centralize data storage in the data center to provide adequate security to data.
What should Susan do to perform the required tasks?
1. Implement the Wireless Fidelity protocol and RAID devices
2. Use the Infrared Data Association protocol and Redundant Array of Inexpensive Disks devices
3. Use the Infrared Data Association protocol and Fibre Channel devices
4. Use the Wireless Fidelity protocol and Fibre Channel devices

John is a network administrator assigned to perform data transfer between two LANs situated five kilometers
apart. Which of the wireless technology should John use for such wireless data transmission?
1. Bluetooth
2. Infrared Data Association
3. VSAT
4. Worldwide Interoperability for Microwave Access

The protocol based on the request and response commands, which is used to inform the Network
Management System (NMS) about the occurrence of a significant event. Which of the following command will
satisfy the above task?
1. SNMP Get Command
2. SNMP GetNext command
3. SNMP Trap Command
4. SNMP Set Command

Quality Software, The organization decides to implement a Network Attached Storage (NAS) in the new
branch at Chicago to manage the data resources of the organization network. Larry, the network admin is
assigned the task to implement NAS filer in the organization network. For this, Larry wants to create a list of
data paths for NAS filer to transfer data to the clients and servers in the network. In addition, Larry wants to
create an access control lists for NAS Filer to specify the access rights of a NAS devices on other NAS devices.
What should Larry do to perform the task?
1. Implement the HTTP protocol
2. Implement the FTP protocol
3. Implement the CIFS protocol
4. Implement the NFS protocol

Which technique facilitates the migration of data between heterogeneous storage devices and servers?
1. Hardware virtualization
2. Network virtualization
3. Server virtualization
4. Storage virtualization
Advance Systems and Network Management

To secure the network of the company ABC Corp, Tom , the network administrator, configures an Intrusion
Detection System (IDS). Tom has been asked to determine the status of the patterns, such as the size of the
data packet of the network traffic. Which of the following technique should Tom implement to ensure an
alarm rings when the network detects an intrusion?
1. Interval based IDS
2. Network based IDS
3. Real time IDS
4. Host based IDS

Which technique facilitates the migration of data between heterogeneous storage devices and servers?
1. Hardware virtualization
2. Network virtualization
3. Server virtualization
4. Storage virtualization

Global Experts needs to host and manage various servers and telecommunication devices of the customers.
The servers and telecommunication devices placed in the data center are managed by a group of system
administrators recruited for this purpose. Recently, the management of the organization has decided to
improve the quality of services provided by the data center. Therefore, the management has asked Steve, the
head of the system administrators group to ensure that the servers in the data center remain operational.
What should Steve do to perform the required tasks?
1. Implement autonomic computing in the data center.
2. Implement cluster computing in the data center.
3. Implement utility computing in the data center.
4. Implement grid computing in the data center.

Magnify has a website frequented by many visitors and many transactions take place. The Website's server
may not be able to take the load at times and the database server may crash.
Which is the most appropriate contingency plan Magnify should follow to avoid any Web site failure?
1. End the sessions of visitors who have spend more than a definite time
2. Increase the capacity of Web server and the database server
3. Limit the transaction capacity
4. Backup of Web server and Database server

The head office of the organization, Quality Software Developers is situated on a hill. The organization's
branch offices are located at various locations in a city. The organization needs to establish a secure and
reliable solution for transferring data among these offices. The organization asks the administrator to ensure
the solution provides higher transmission speeds and low cost connectivity between the networks of the
various branches. What should the administrator do to perform the task?
1. Implement Wi-Fi Technology
2. Implement VSAT Technology
3. Implement WiMAX Technology
4. Implement IrDA Technology

Don is working as a networking administrator to prevent unauthorized access by malicious users, Don is
assigned the task of implementing a security system in the enterprise network. He also wants to restrict the
access of certain websites. Which security system should Don use to perform the tasks?
1. The Packet Filtering technique
2. The Stateful Inspection technique
3. The Intrusion Detection system
Advance Systems and Network Management

4. The Proxy Server system

Global Systems, Inc. The organization has two branch offices at two locations and a LAN has been set up at
both branch offices to connect the computers of the organization. Mary needs to connect the two LAN
segments of the organization's network. She also needs to ensure that video signals can be transmitted on the
network. What should Mary do to perform the task?
1. Use switches and coaxial cables
2. Use switches and twisted pair cables
3. Use routers and coaxial cables
4. Use routers and twisted pair cables

Which feature of enterprise management enables a network administrator to obtain correct information
related to the hardware and software components used in an enterprise?
1. Patch management
2. Network monitoring
3. Software deployment
4. PC inventory management

SuperGraphics Inc, is a software development organization. Larry, the network administrator, has recently set
up a SAN to efficiently manage the storage traffic in the organization. However, the management has
observed that the performance of the SAN is not sufficient. The management asks Larry to improve the
performance of the existing SAN. Therefore, to improve the performance Larry needs to consider that only 8
users can concurrently analyze the SAN performance. What should Larry do to perform the required task?
1. Use Finiser’s Analyzer tool
2. Use McDATA SANavigator tool
3. Use IBM StorWatch tool
4. Use NetWisdom tool

Which of the following field of the Simple Network Management Protocol version 2 Protocol Data Unit for the
GetBulk command is used for object instances of scalar objects?
1. Variable bindings
2. Max repetitions
3. Non-repeaters
4. Request ID

Which of the following Protocol Data Unit field in the Simple Network Management Protocol version 1
message associates an error with the corresponding object instance?
1. Request ID
2. Error status
3. Error index
4. Variable bindings

Which area of network management tasks involves controlling user access to network resources?
1. Configuration management
2. Security management
3. Accounting management
4. Fault management

Which level of storage virtualization technique enables applications to remain online while adjusting the
volume size and file system across an enterprise network?
Advance Systems and Network Management

1. File level
2. Storage level
3. Server level
4. Fabric level

What is open channel of communication?


1. One way communication
2. High cost communication
3. Interface communication
4. Back-and-forth communication

Which network connection device is used in the third layer of Open System Interconnection Model and
interconnects Local Area Network with Wide Area Network?
1. Bridges
2. Routers
3. Intelligent Hubs
4. Switches

Technology Systems is a leading company in the IT sector. Ron, the network administrator, is assigned the task
to implement security mechanism that helps identify, log, resolve, and analyze the troubles related to the
systems and networks in an enterprise What aspect of enterprise management should Ron consider to
perform the task?
1. Storage Management
2. Change Management
3. Problem Management
4. Facilities Management

John is a network administrator at Blue Moon Computers. The organization has set up a data center to
provide various data center services, such as Web hosting and co-location. To enable the users of the
enterprise to host Web sites of multiple clients, John configures a Web server in the data center. However,
Steve receives complaints that at times unauthorized users are able to access the Web server. What should
John do to solve the preceding problems?
1. Provide dedicated hosting and managed services to the users.
2. Provide shared hosting and value added services to the users.
3. Provide dedicated hosting and value added services to the users.
4. Provide shared hosting and managed services to the users.

Ronald, the network administrator for the enterprise Smart Developers. He is assigned the task of configuring
the Intrusion Detection System (IDS) in the enterprise network to view the attack-related data. Which of the
following component of the detection should Ronald consider to perform the task?
1. Analyzer
2. Console
3. Managing agent
4. Sensor

Which Product Transition factor signifies the effort needed to transfer a program to another system?
1. Portability
2. Interoperability
3. Configurability
4. Reusability
Advance Systems and Network Management

Steve is a network administrator at Bluemoon computers. All the research and development centers of the
company are located in the hilly area. Steve wants to establish a communication between a data center and
various enterprise networks with data transfer speeds of 1-10 Mbps. Which type of wireless network should
he use to perform the above task?
1. Microwave communication
2. Infrared communication
3. Radio communication
4. Point to point Infrared communication

Global Systems Inc is a multinational call center, which makes efforts to provide efficient customer services,
by managing and storing large volumes of customer related information Global Systems asks Johnson, the
database administrator to set up a new data center to ensure continuous availability of data and the IT
related services to its Client. In addition, Global Systems wants the servers located in a data center to store
data up to 1 GB. Which features of the data center enable Johnson to perform the required tasks?
1. Disaster recovery and business continuity services and shared hosting.
2. Co-location and dedicated hosting
3. Co-location and shared hosting
4. Mail Messaging Services and dedicated hosting

John is the network administrator of the organization, Tech Systems. The organization has many departments,
such as marketing, sales, and production. To efficiently manage data across the organization's network and to
logically separate the computers storing data in a data center, he needs to create several segments according
to the department names. He also needs to ensure that the data transmission over the organization's network
is cost effective. What should John do to perform the task?
1. Implement VLAN using twisted pair cable
2. Implement VLAN using coaxial cable
3. Implement LAN using twisted pair cable
4. Implement LAN using coaxial cable

You might also like