Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
Which of the following password security options enables the server to "˜remember" a user's previous passwords?a. Minimum password length b. Enforce password history c. Passwords must meet complexity requirementsd. Minimum password age
Q:
You manage a multi-domain network, DomainA, DomainB, and DomainC. You have users from each domain that must have permission to a shared folder in DomainB. Which of the following represents the correct method of assigning these users permissions?a. Create a Global group in DomainB and add each user to the group. Assign the Global group permission to the share. b. Create a Local group in each domain. Add users from each domain to the respective Local groups and add the Local groups to the permissions list of the share. c. Create a Universal group. Add the users from the domains to the Universal group and add the Universal group to the share permissions list.d. Create a Global group in each domain.Add the users from the respective domains to the Global group. Add the Global groups to the share permissions list.
Q:
Which of the following is NOT a function of a directory service?a. central listing of resources b. facilitates finding resources c. facilitates managing and accessing resourcesd. decentralizes user management
Q:
You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?a. Universal b. Global c. Domain locald. Local
Q:
You have shared a folder on a Windows server that is a part of a domain. You need to assign permissions to users so they can access the shared folder. Which type of group will you use to make the permissions assignment?a. Local b. Domain local c. Globald. Universal
Q:
You are explaining to a colleague how to make a shared resource available on a Linux file system. Which of the following terms best describes what you should tell him?a. map a drive letter b. mount a drive letter c. mount a volumed. map a volume
Q:
NFS is used by UNIX/Linux systems to mount a shared partition as a drive letter.
Q:
Global groups are used to hold user accounts while domain local groups are used to hold Global groups and provide access to resources.
Q:
It is preferable to assign permissions to individual users rather than groups because the amount of work for the administrator is reduced.
Q:
In Linux, a network drive that is attached to the file system is called a mapped drive.
Q:
Windows computers can make a shared drive look like a local drive by mapping.
Q:
What is the purpose of protocol binding?
Q:
Aside from TCP and IP, list three protocols used in the TCP/IP suite of protocols and a brief explanation of their purpose.
Q:
List three functions performed by TCP.
Q:
List three types of network communications for which network protocols are used.
Q:
Describe the function of a router.
Q:
Describe the difference between a hub and a switch.
Q:
Describe the difference between a LAN and a WAN.
Q:
List three networking services typically provided by a Windows server OS that is not provided by a Windows client OS.
Q:
Briefly describe a network.
Q:
a. binding f. frameb. bridge g. CIDRc. terminal h. multicastd. backbone i. APIPAe. payload j. Ethernet1/ a device that has a keyboard and monitor but no CPU or storage2/ an IP address in the range 169.254.0.1 to 169.254.255.254 that is automatically assigned.3/ a way to ignore IPv4 address class designation by using addressing that puts a slash (/) after the dotted decimal notation4/ a network transport protocol that uses CSMA/CD communications5/ a main connecting link or highway between networks, such as between floors in a building or between buildings6/ a transmission method in which a server divides recipients of an application,such as a multimedia application, into groups7/ a network device that connects two or more segments into one, or extends an existing segment8/ that portion of a frame, packet, or cell that contains the actual data9/ a process that enables the NIC to format data for a protocol, and identify the most efficient methods for transporting it10/ a data unit sent over a network that contains source and destination, control, and error-detection information, as well as the data
Q:
The _________ address is used for diagnostics and uses the IPv6 address of 0:0:0:0:0:0:0:1.
Q:
The __________ is the software logic on a NIC that consists of one or more programs residing in a programmable chip on the card.
Q:
A _____________ is the physical design of the network, or the path data takes when it goes from one computer to another.
Q:
_________ runs on Windows Server 2008 and is used to install client OSs on a mass scale.
Q:
A _____________ OS enables a workstation to run applications and access shared resources, but is usually not involved in authentication or sharing resources.
Q:
You have a server on your network that your users frequently access. You don"t want the server's address to change. What type of addressing method should you use?a. APIPA b. static c. DHCPd. unicast
Q:
Which of the following enables the NIC to format data for a protocol and identify the most efficient methods for transporting it?a. installing b. configuring c. bindingd. subnetting
Q:
Which protocol enables routers to build tables of routing information?a. SMTP b. RIP c. TCPd. PPP
Q:
Which of the following is true of IPv6 addresses?a. they are 128 bits in length b. Windows Server 2008 does not support them c. IPv6 follows IPv5 which used 48-bit addressesd. they cannot be used for voice and video applications
Q:
You are diagnosing a network communication problem on a computer that uses the TCP/IP protocol. What address can you use to test network services without actually accessing the network?a. 10.0.0.1 b. 1.0.0.0 c. 127.0.0.1d. 0.0.0.0
Q:
You are designing a new network that will use TCP/IP. You are trying to decide which class of IP address you should use. There will be several thousand nodes on the network and you want to use an address class suitable for medium-sized networks. What address class should you use?a. class A b. class B c. class Cd. class D
Q:
You are troubleshooting a problem with a network that is composed of several subnets connected by routers. You have determined that the problem lies with the packet routing function. Which of the following is most responsible for this function?a. TCP b. FTP c. IPd. SMTP
Q:
Which of the following is a task typically performed by TCP?a. packet addressing b. closes communication session c. handles packet routingd. fragments packets as needed
Q:
Which of the following is NOT a likely consideration when purchasing a NIC?a. the cable interface matches the cabling used on the network b. there is a driver available for the OS c. the MAC address of the NICd. the NIC bus interface matches an available expansion slot
Q:
You are setting up a wireless network. The environment in which this network will run has several other devices such as cordless phones that run in the 2.4 GHz frequency range. You want to avoid conflicts with other devices. Which wireless standard should you consider?a. 802.11a b. 802.11b c. 802.11gd. 802.11i
Q:
Which of the following is true of Ethernet?a. uses CSMA/CA b. usually implemented in a ring topology c. defined by the 802.11 standardd. Fast Ethernet is 100 Mbps
Q:
Which of the following is NOT a common function of a network protocol?a. schedule network applications to run b. enable communications over the Internet c. coordinate transport of packetsd. enable remote access to networks
Q:
You have been told by a colleague that the type of network in use at a new client site uses fixed-length payloads and has information in the header that allows the data unit to be routed according to the type of data carried within the unit. What type of data unit is in use?a. packet b. frame c. segmentd. cell
Q:
You are called in to a business that just expanded its network onto another floor of the building. There are 30 stations on each floor. You have been told that the two groups of computers must be able to communicate but for security reasons, there must be a way to filter communication between the two networks. What device do you recommend?a. hub b. router c. wireless access pointd. bridge
Q:
You need to connect two groups of about 20 computer each that are located on different floors of a building. Which media type will work best for this scenario?a. coax b. UTP c. fiber-opticd. HFC
Q:
You are trying to decide which media you should use to connect the computers in a small business network that will have 15 computers. You want media that works well with LANs, is reasonably priced and is fairly flexible to aid installation. After reading about the various media available, what should you use?a. coax b. HFC c. UTPd. STP
Q:
A colleague has asked you where the media access control address of his computer is located? What do you tell him?a. NIC b. switch c. BIOSd. hub
Q:
You have been hired to design a small office network that will have 10 workstations and two servers. You want to use a network topology that is flexible for future growth and performance enhancements. Which topology should you choose?a. ring b. star c. busd. mesh
Q:
Which of the following accurately describes a function of a LAN?a. offers networking services over a long distance b. connects office networks in two different cities c. uses a modem to connect to an ISPd. uses switches to connect computers
Q:
Which of the following is NOT a typical function of a client operating system?a. enables a workstation to run applications b. processes information locally c. authenticates clients to access the networkd. communicates with other computers over the network
Q:
TCP establishes communication sessions among applications on two communicating computers.
Q:
The transmission control method used by Ethernet is called collision sense multiple access with carrier detection (CSMA/CD)..
Q:
A large file is broken into hundreds of small data units called packets and each data unit is transmitted across the network.
Q:
LANs often connect WANs over a long distance such as between cities, states, or countries.
Q:
A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources.
Q:
What is the difference between ADSL and SDSL?
Q:
Name two enhancements of DOCSIS 3.0 over non-DOCSIS compliant cable modems?
Q:
What are the two interfaces supported in ISDN and what are their respective data rates?
Q:
Discuss operational auditing. Include in your discussion what should be looked for in an operational audit and what methods might be used in the audit.
Q:
What is security auditing and what type of information should be analyzed?
Q:
List three types of changes for which you should use change management.
Q:
How can change adversely affect your network?
Q:
Discuss the process of IDPS signature evaluation.
Q:
How does distributed data collection work when collecting data from multiple sensors?
Q:
List the advantages of centralized data collection.
Q:
If you determine that a Trojan program has been installed and is initiating a connection to a remote host and you suspect passwords have been compromised, what steps should you take? List three of them.
Q:
List four type of events you should monitor as part of a security event management program.
Q:
a. active defense in depth f. operational auditb. centralized data collection g. security event management programc. degaussing h. social engineeringd. distributed data collection i. target-to-console ratioe. independent audit j. Tinkerbell program1/ an audit in which an outside firm inspects audit logs to ensure that an organization is collecting the information it needs2/ a strong implementation of the DiD concept in which security personnel expect that attacks will occur and try to anticipate them3/ a technique of tricking employees into divulging passwords or other information4/ the process of magnetically erasing an electronic device, such as a monitor or a disk5/ the number of target computers on a network managed by a single command console6/ an audit by an organization's own staff that examines system and security logs7/ a system in which an organization's event and security data is funneled to a management console in the main office8/ a program in which network connections are scanned and alerts are generated when logons are attempted from a suspicious IDPS9/ a program that gathers and consolidates events from multiple sources so that the information can be analyzed to improve network security10/ a system in which data from security devices goes to a management console on its own local network
Q:
A(n) ____________________ audit should look for accounts assigned to employees who have left the company or user group.
Q:
One way to consolidate the data from several network and security devices is to transfer the information to a central _______________.
Q:
Groups known as ______________ teams are assembled to actively test a network.
Q:
_______________ management involves modifying equipment, systems, software, or procedures in a sequential, planned way.
Q:
You monitor and evaluate network traffic to gather evidence that indicates whether your IDPS _________________ are working well or need to be updated.
Q:
With ___________________ data collection, data from security devices goes to a management console on its own local network.
Q:
Each IDPS has _____________ that gather data passing through the gateway.
Q:
The ________________ command reviews the current connections and reports which ports a server is listening to.
Q:
You should review the logs and alerts created by your security devices, a process called _________ monitoring.
Q:
To manage the security information from the devices in a large network, you should establish a security incident _________________ team.
Q:
How much space is typically needed to store IDPS data?a. a few hundred Kilobytes c. a megabyte or twob. a gigabyte or more d. at least a terabyte
Q:
Which aspect of strengthening the performance of IDPS may involve degaussing?a. managing memory c. managing storageb. managing bandwidth d. managing processors
Q:
What approach to security calls for security through a variety of defensive techniques that work together?a. DOA c. DiDb. WoL d. PoE
Q:
What should an outside auditing firm be asked to sign before conducting a security audit?a. subpoena c. search and seizure contractb. nondisclosure agreement d. social engineering covenant
Q:
The process of testing a network defense system is referred to as which of the following?a. security auditing c. IDPS evaluationb. change management d. distributed data collection
Q:
Which type of change does NOT typically require the use of change management procedures?a. new VPN gateways c. changing a manager's permissions to a fileb. changes to ACLs d. new password systems or procedures