100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

COS2626 Updated Exam Pack 2023

Beoordeling
-
Verkocht
-
Pagina's
260
Cijfer
A+
Geüpload op
25-09-2023
Geschreven in
2023/2024

COS2626 Updated Exam Pack of 2023 with actual exam questions and answers, from 2018 to 2022 October November

Instelling
Vak











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
25 september 2023
Aantal pagina's
260
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

For Assistance with other modules
Whatsapp +27682021794
www.myassignments.co.za




COS2626
EXAM PACK

2017-2022

,OCT_NOV_2022_COS2626


Question 1
It is a protocol used for accessing network-based LDAP directories.
Routers rate the ___________ and ___________ of a routing protocol's data based on the
criterion of AD (Administrative Distance), convergence time and overhead.
a. throughput; latency
b. availability; support
c. hop count; load
d. reliability; priority
Question 2
Which of the following are NOT valid MAC (Media Access Control) addresses?
Select one or more:
a. ::9F53
b. D0:00:00:00
c. C3:00:50:00:FF:FF
d. FE80::32:1CA3:B0E2
e. 153.101.24.3
Question 3
Jeff Green has been hired as a systems analyst by an online retail company. The company
is expecting a huge network traffic triggered by the Christmas sale, which will begin from
the midnight of December 23. There is an urgent need to adopt a congestion control
technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop
congestion control technique to prevent this congestion before it occurs. Which one of the
following techniques should Jeff ideally choose to ensure that important traffic can survive
the congestion while less sensitive frames are discarded?
a. Admission policy
b. Discarding policy
c. Acknowledgement policy
d. Window policy
Question 4
From the list below, HOW MANY are examples of routing metrics used to determine the
best path?
a. 9
b. 8
c. 6
d. 7

,Question 5
Which of the following statements regarding SANs (Storage Area Networks) are TRUE?
Select one or more:
a. SANs use one of these technologies: Fibre Channel (FC), FCoE (Fibre Channel over
Ethernet), iSCSI (Internet SCSI) or IB (InfiniBand).
b. A SAN abstracts storage services from computer services, and then provides high-
speed network services to connect them.
c. SANs are highly scalable and have a very high fault tolerance, massive storage
capabilities and fast data access.
d. A SAN cannot be installed in a location separate from the LAN (Local Area Network) it
serves.
Question 6
Which statements regarding MPLS (Multiprotocol Label Switching) are TRUE?
Select one or more:
a. One of the benefits of MPLS is that MPLS connections are highly scalable.
b. Collectively, the MPLS labels are sometimes called a fragment because of their
placement between Layer 3 and Layer 2 information.
c. MPLS enables multiple types of Layer 3 protocols to travel over any one of several
connection-oriented Layer 2 protocols.
d. MPLS offers potentially faster transmission than traditionally routed networks.
Question 7
You are creating a new Linux server as a virtual machine on your Windows 8.1 workstation.
Which one of the following commands will display TCP/IP (Transmission Control
Protocol/Internet Protocol) information associated with every interface on a Linux device?
a. ipconfig –a at the Linux server’s shell prompt
b. ifconfig –a at the Linux server’s shell prompt
c. ipconfig /all at the Windows command prompt
d. ethtool –a at the Linux server’s shell prompt
e. ip addr at the Windows command prompt
Question 8
James, a supporting technician, is trying to resolve an issue pertaining to the router. On
inspecting the issue, he figured that the router was unable to move packages from one node
to another. As a resolution to this problem, he intends to follow the OSI (Open Systems
Interconnection) model for troubleshooting. What layer of the OSI model should he inspect
to understand the issue relating to the router?
a. The physical layer
b. The network layer
c. The transport layer
d. The session layer

, Question 9
Identify the standard from the following list of CHARACTERISTICS.
a. 802.3af
b. 802.9de
c. 802.7bc
d. 802.5bf
Question 10
When a hacker attempts to perform a VLAN (Virtual Local Area Network) hopping attack,
which TWO approaches are likely to be used?
Select one or more:
a. DNS (Domain Name System) spoofing
b. double tagging
c. tagging
d. switch spoofing
Question 11
Which scanning tool was used to detect a SOHO router's administrative username and
password as depicted in the following diagram?
a. Nmap
b. Nessus
c. Metasploit
Question 12
Which one of the following is NOT a step every IT technician should take to safeguard
sensitive information, logged data and other legal evidence until the incident response
team can take over the collection of evidence?
a. Secure the area and disconnect devices from the network
b. Create documentation detailing the scene
c. Protect the chain of custody of evidence
d. Access files on a computer being collected for evidence
Question 13
In the context of terminal emulation, which one of the following statements regarding VNC
(Virtual Network Computing or Virtual Network Connection) is CORRECT?
a. VNC is open source, allowing companies to develop their own software.
b. VNC is faster than Remote Desktop and requires less network bandwidth.
c. VNC uses the Remote Desktop Protocol (RDP).
d. VNC is a standard developed by Microsoft and used by Windows Remote Desktop.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MyAssignments My Assignments
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
171
Lid sinds
4 jaar
Aantal volgers
144
Documenten
38
Laatst verkocht
4 maanden geleden
My Assignments

3,8

21 beoordelingen

5
11
4
3
3
2
2
1
1
4

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen