Free 100-150 Exam Dumps

Question 6

For each statement about bandwidth and throughput, select True or False.
Note: You will receive partial credit for each correct selection.
100-150 dumps exhibit
Solution:
✑ Statement 1: Low bandwidth can increase network latency.
✑ Statement 2: High levels of network latency decrease network bandwidth.
✑ Statement 3: You can increase throughput by decreasing network latency.
✑ Bandwidth vs. Latency: Bandwidth refers to the maximum rate at which data can be transferred over a network path. Latency is the time it takes for a data packet to travel from the source to the destination.
References:
✑ Network Performance Metrics: Cisco Network Performance
✑ Understanding Bandwidth and Latency: Bandwidth vs. Latency

Does this meet the goal?

Correct Answer:A

Question 7

DRAG DROP
Move each cloud computing service model from the list on the left to the correct example on the right
Note: You will receive partial credit for each correct answer.
100-150 dumps exhibit
Solution:
✑ Three virtual machines are connected by a virtual network in the cloud.
✑ Users access a web-based graphics design application in the cloud for a monthly fee.
✑ A company develops applications using cloud-based resources and tools.
✑ IaaS (Infrastructure as a Service): Provides virtualized hardware resources that customers can use to build their own computing environments.
✑ PaaS (Platform as a Service): Offers a platform with tools and services to develop,
test, and deploy applications.
✑ SaaS (Software as a Service): Delivers fully functional applications over the internet that users can access and use without managing the underlying infrastructure.
References:
✑ Cloud Service Models: Understanding IaaS, PaaS, SaaS
✑ NIST Definition of Cloud Computing: NIST Cloud Computing

Does this meet the goal?

Correct Answer:A

Question 8

A local company requires two networks in two new buildings. The addresses used in these networks must be in the private network range.
Which two address ranges should the company use? (Choose 2.) Note: You will receive partial credit for each correct selection.

Correct Answer:AD
The private IP address ranges that are set aside specifically for use within private networks and not routable on the internet are as follows:
✑ Class A: 10.0.0.0 to 10.255.255.255
✑ Class B: 172.16.0.0 to 172.31.255.255
✑ Class C: 192.168.0.0 to 192.168.255.255
These ranges are defined by the Internet Assigned Numbers Authority (IANA) and are used for local communications within a private network123.
Given the options: A. 172.16.0.0 to 172.31.255.255 falls within the Class B private range.
* B. 192.16.0.0 to 192.16.255.255 is not a recognized private IP range. C. 11.0.0.0 to 11.255.255.255 is not a recognized private IP range. D. 192.168.0.0 to 192.168.255.255 falls within the Class C private range.
Therefore, the correct selections that the company should use for their private networks are
A and D. References :=
✑ Reserved IP addresses on Wikipedia
✑ Private IP Addresses in Networking - GeeksforGeeks
✑ Understanding Private IP Ranges, Uses, Benefits, and Warnings

Question 9

Which two pieces of information should you include when you initially create a support ticket? (Choose 2.)

Correct Answer:AC
✑ Statement A: "A detailed description of the fault." This is essential for support staff to understand the nature of the problem and begin troubleshooting effectively.
✑ Statement C: "A description of the conditions when the fault occurs." This helps in reproducing the issue and identifying patterns that might indicate the cause of the fault.
✑ Statement B: "Details about the computers connected to the network." While useful, this is not as immediately critical as understanding the fault itself and the conditions under which it occurs.
✑ Statement D: "The actions taken to resolve the fault." This is important but typically follows the initial report.
✑ Statement E: "The description of the top-down fault-finding procedure." This is more of a troubleshooting methodology than information typically included in an initial support ticket.
References:
✑ Best Practices for Submitting Support Tickets: Support Ticket Guidelines

Question 10

Which protocol allows you to securely upload files to another computer on the internet?

Correct Answer:A
SFTP, or Secure File Transfer Protocol, is a protocol that allows for secure file transfer capabilities between networked hosts. It is a secure extension of the File Transfer Protocol (FTP). SFTP encrypts both commands and data, preventing passwords and sensitive information from being transmitted openly over the network. It is typically used for secure file transfers over the internet and is built on the Secure Shell (SSH) protocol1. References :=
•What Is SFTP? (Secure File Transfer Protocol)
•How to Use SFTP to Safely Transfer Files: A Step-by-Step Guide
•Secure File Transfers: Best Practices, Protocols And Tools
The Secure File Transfer Protocol (SFTP) is a secure version of the File Transfer Protocol (FTP) that uses SSH (Secure Shell) to encrypt all commands and data. This ensures that sensitive information, such as usernames, passwords, and files being transferred, are securely transmitted over the network.
•ICMP (Internet Control Message Protocol) is used for network diagnostics and is not designed for file transfer.
•NTP (Network Time Protocol) is used to synchronize clocks between computer systems and is not related to file transfer.
•HTTP (HyperText Transfer Protocol) is used for transmitting web pages over the internet and does not inherently provide secure file transfer capabilities.
Thus, the correct protocol that allows secure uploading of files to another computer on the internet is SFTP.
References :=
•Cisco Learning Network
•SFTP Overview (Cisco)