Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
Describe what happens when a shared folder is being access over the network and both sharing and NTFS permissions are set and a conflict exists.
Q:
You are setting up permissions to a folder that will be accessed using a Web browser. You want then to have the ability to view the files, folders and subfolders. What permission must you assign?
Q:
List and describe two of the Kerberos configuration options.
Q:
You want to be sure that if somebody is trying to guess one of your user's passwords, the account will be locked out after 4 unsuccessful password entries. Furthermore, you want the account to be locked out for one hour before it automatically unlocks. The count of unsuccessful attempts should be reset after 20 minutes. What account lockout policies should you set and with what values?
Q:
You administer a medium-size network. You want to make sure your users must change their passwords every 60 days, cannot change their password sooner than five days after the last change and must use 8 unique passwords before re-using a password. What account policies would you set and with what values?
Q:
You need to give the five department managers access to a printer on your Windows Server 2008 domain. Briefly describe the process.
Q:
List three important functions provided by a directory service.
Q:
Describe the difference between Local groups and Domain local groups.
Q:
Describe the difference between mapping a drive and mounting a volume.
Q:
a. group f. home directoryb. distribution group g. SMBc. container object h. UIDd. domain i. remote procedure calle. security group j. forest1/an Active Directory container that holds one or more trees2/in Active Directory, this is a grouping of resources into a functional unit for management3/a group of Windows Server 2003/Server 2003 R2 and Server 2008/Server 2008 R2 users that is used to assign access privileges4/a list of Windows Server 2003/Server 2003 R2 and Server 2008/Server 2008 R2 users that is not used for security5/enables services and software on one computer to use services and software on a different computer6/a protocol mainly used for sharing folders, files, and printers7/an entity used to group together resources; examples are organizational unit, domain, or forest in Microsoft Active Directory8/a number that is assigned to a UNIX/Linux user account9/a collection of computers and users where policies set for the group apply to all computers and users10/ a user work area in which the user stores data on a server and typically has control over whether to enable other users to access his or her data
Q:
In Windows, the ___________ sharing permission enables users to read, add, modify, execute, and delete files but not change permissions.
Q:
The account lockout ____________ enables you to set a limit to the number of unsuccessful attempts to log onto an account.
Q:
You use __________ groups to hold user accounts from the same domain as members.
Q:
A _________________ service provides a central listing of resources and the ability to access and manage resources.
Q:
___________ is a software process that enables a client workstation to attach to a shared folder on another workstation and assign it a drive letter.
Q:
Which of the following permissions should you set on a shared printer in Windows to allow a junior administrator to configure the properties of the printer?a. Full Control b. Manage Printers c. Manage Documentsd. Modify
Q:
You need to specify which clients are allowed to access files on a UNIX/Linux system using NFS. What should you do?a. configure the sharing permissions b. edit the smb.conf file c. edit the /etc/hosts.allow filed. edit the /usr/nfsconfig file
Q:
Q:
Which of the following is NOT an event type that can be set up for logging using Server Admin on Mac OS X Server?a. Login and Logout events b. Installation of applications c. Opened filesd. Deleted files
Q:
You need to assign the read and execute permission to a folder named /docs/acctg to other. Which of the following commands does this?a. chmod o +rx /docs/acctg b. chmod /docs/acctg o -rx c. chmod /docs/acctg +rx od. chmod -rx o /docs/acctg
Q:
Which of the following is a valid permission in the Linux file system?a. Full Control b. Modify c. Writed. Change
Q:
You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system. You left the password blank so the user can easily log on and create her own password. The user calls you and informs you she cannot logon. She has tried several times and has used a blank password but still cannot logon. What is likely to be the problem?a. you didn"t add the user to the right group b. the user is not entering the password correctly c. the user has caps lock ond. the account is disabled
Q:
You need to create a user on your Red Hat Enterprise Linux system. What command should you use?a. newuserb. userconf c. useraddd. moduser
Q:
To protect user's passwords on a Linux system, they can be kept in a file only available to the system administrator. What is the name of that file?a. /etc/passwd b. /sys/secpass c. /etc/shadowd. /sys/encryptpass
Q:
Which of the following is NOT included in the Linux password (/etc/passwd) file?a. user name b. user permissions c. UIDd. home directory location
Q:
Which of the following is true about permissions on an NTFS volume?a. newly created files have no permissions set b. a file that is moved to another volume inherits the parent folder's permissions c. a file that is copied from a FAT volume to an NTFS volume has no permissions setd. A file that is copied within the same volume retains its existing permissions
Q:
A user is complaining that he cannot open a file in a shared folder. He is able to open other files in the same shared folder. Which of the following could be the problem?a. his network connection is not working b. he does not have Read share permission to the share c. he has entered the wrong password to gain access to the filed. he has Read sharing permission but has a Deny permission on the file
Q:
Which permission to a folder should you give a user if that user should be able to create files but not read or execute files in that folder?a. Full control b. Modify c. Writed. Read & Execute
Q:
Which account feature can be configured to prevent a user from logging in after incorrectly entering the password a number of times?a. Account disable b. Account expiration c. Account lockoutd. Account reset
Q:
Which of the following password security options enables the server to "˜remember" a user's previous passwords?a. Minimum password length b. Enforce password history c. Passwords must meet complexity requirementsd. Minimum password age
Q:
You manage a multi-domain network, DomainA, DomainB, and DomainC. You have users from each domain that must have permission to a shared folder in DomainB. Which of the following represents the correct method of assigning these users permissions?a. Create a Global group in DomainB and add each user to the group. Assign the Global group permission to the share. b. Create a Local group in each domain. Add users from each domain to the respective Local groups and add the Local groups to the permissions list of the share. c. Create a Universal group. Add the users from the domains to the Universal group and add the Universal group to the share permissions list.d. Create a Global group in each domain.Add the users from the respective domains to the Global group. Add the Global groups to the share permissions list.
Q:
Which of the following is NOT a function of a directory service?a. central listing of resources b. facilitates finding resources c. facilitates managing and accessing resourcesd. decentralizes user management
Q:
You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?a. Universal b. Global c. Domain locald. Local
Q:
You have shared a folder on a Windows server that is a part of a domain. You need to assign permissions to users so they can access the shared folder. Which type of group will you use to make the permissions assignment?a. Local b. Domain local c. Globald. Universal
Q:
You are explaining to a colleague how to make a shared resource available on a Linux file system. Which of the following terms best describes what you should tell him?a. map a drive letter b. mount a drive letter c. mount a volumed. map a volume
Q:
NFS is used by UNIX/Linux systems to mount a shared partition as a drive letter.
Q:
Global groups are used to hold user accounts while domain local groups are used to hold Global groups and provide access to resources.
Q:
It is preferable to assign permissions to individual users rather than groups because the amount of work for the administrator is reduced.
Q:
In Linux, a network drive that is attached to the file system is called a mapped drive.
Q:
Windows computers can make a shared drive look like a local drive by mapping.
Q:
What is the purpose of protocol binding?
Q:
Aside from TCP and IP, list three protocols used in the TCP/IP suite of protocols and a brief explanation of their purpose.
Q:
List three functions performed by TCP.
Q:
List three types of network communications for which network protocols are used.
Q:
Describe the function of a router.
Q:
Describe the difference between a hub and a switch.
Q:
Describe the difference between a LAN and a WAN.
Q:
List three networking services typically provided by a Windows server OS that is not provided by a Windows client OS.
Q:
Briefly describe a network.
Q:
a. binding f. frameb. bridge g. CIDRc. terminal h. multicastd. backbone i. APIPAe. payload j. Ethernet1/ a device that has a keyboard and monitor but no CPU or storage2/ an IP address in the range 169.254.0.1 to 169.254.255.254 that is automatically assigned.3/ a way to ignore IPv4 address class designation by using addressing that puts a slash (/) after the dotted decimal notation4/ a network transport protocol that uses CSMA/CD communications5/ a main connecting link or highway between networks, such as between floors in a building or between buildings6/ a transmission method in which a server divides recipients of an application,such as a multimedia application, into groups7/ a network device that connects two or more segments into one, or extends an existing segment8/ that portion of a frame, packet, or cell that contains the actual data9/ a process that enables the NIC to format data for a protocol, and identify the most efficient methods for transporting it10/ a data unit sent over a network that contains source and destination, control, and error-detection information, as well as the data
Q:
The _________ address is used for diagnostics and uses the IPv6 address of 0:0:0:0:0:0:0:1.
Q:
The __________ is the software logic on a NIC that consists of one or more programs residing in a programmable chip on the card.
Q:
A _____________ is the physical design of the network, or the path data takes when it goes from one computer to another.
Q:
_________ runs on Windows Server 2008 and is used to install client OSs on a mass scale.
Q:
A _____________ OS enables a workstation to run applications and access shared resources, but is usually not involved in authentication or sharing resources.
Q:
You have a server on your network that your users frequently access. You don"t want the server's address to change. What type of addressing method should you use?a. APIPA b. static c. DHCPd. unicast
Q:
Which of the following enables the NIC to format data for a protocol and identify the most efficient methods for transporting it?a. installing b. configuring c. bindingd. subnetting
Q:
Which protocol enables routers to build tables of routing information?a. SMTP b. RIP c. TCPd. PPP
Q:
Which of the following is true of IPv6 addresses?a. they are 128 bits in length b. Windows Server 2008 does not support them c. IPv6 follows IPv5 which used 48-bit addressesd. they cannot be used for voice and video applications
Q:
You are diagnosing a network communication problem on a computer that uses the TCP/IP protocol. What address can you use to test network services without actually accessing the network?a. 10.0.0.1 b. 1.0.0.0 c. 127.0.0.1d. 0.0.0.0
Q:
You are designing a new network that will use TCP/IP. You are trying to decide which class of IP address you should use. There will be several thousand nodes on the network and you want to use an address class suitable for medium-sized networks. What address class should you use?a. class A b. class B c. class Cd. class D
Q:
You are troubleshooting a problem with a network that is composed of several subnets connected by routers. You have determined that the problem lies with the packet routing function. Which of the following is most responsible for this function?a. TCP b. FTP c. IPd. SMTP
Q:
Which of the following is a task typically performed by TCP?a. packet addressing b. closes communication session c. handles packet routingd. fragments packets as needed
Q:
Which of the following is NOT a likely consideration when purchasing a NIC?a. the cable interface matches the cabling used on the network b. there is a driver available for the OS c. the MAC address of the NICd. the NIC bus interface matches an available expansion slot
Q:
You are setting up a wireless network. The environment in which this network will run has several other devices such as cordless phones that run in the 2.4 GHz frequency range. You want to avoid conflicts with other devices. Which wireless standard should you consider?a. 802.11a b. 802.11b c. 802.11gd. 802.11i
Q:
Which of the following is true of Ethernet?a. uses CSMA/CA b. usually implemented in a ring topology c. defined by the 802.11 standardd. Fast Ethernet is 100 Mbps
Q:
Which of the following is NOT a common function of a network protocol?a. schedule network applications to run b. enable communications over the Internet c. coordinate transport of packetsd. enable remote access to networks
Q:
You have been told by a colleague that the type of network in use at a new client site uses fixed-length payloads and has information in the header that allows the data unit to be routed according to the type of data carried within the unit. What type of data unit is in use?a. packet b. frame c. segmentd. cell
Q:
You are called in to a business that just expanded its network onto another floor of the building. There are 30 stations on each floor. You have been told that the two groups of computers must be able to communicate but for security reasons, there must be a way to filter communication between the two networks. What device do you recommend?a. hub b. router c. wireless access pointd. bridge
Q:
You need to connect two groups of about 20 computer each that are located on different floors of a building. Which media type will work best for this scenario?a. coax b. UTP c. fiber-opticd. HFC
Q:
You are trying to decide which media you should use to connect the computers in a small business network that will have 15 computers. You want media that works well with LANs, is reasonably priced and is fairly flexible to aid installation. After reading about the various media available, what should you use?a. coax b. HFC c. UTPd. STP
Q:
A colleague has asked you where the media access control address of his computer is located? What do you tell him?a. NIC b. switch c. BIOSd. hub
Q:
You have been hired to design a small office network that will have 10 workstations and two servers. You want to use a network topology that is flexible for future growth and performance enhancements. Which topology should you choose?a. ring b. star c. busd. mesh
Q:
Which of the following accurately describes a function of a LAN?a. offers networking services over a long distance b. connects office networks in two different cities c. uses a modem to connect to an ISPd. uses switches to connect computers
Q:
Which of the following is NOT a typical function of a client operating system?a. enables a workstation to run applications b. processes information locally c. authenticates clients to access the networkd. communicates with other computers over the network
Q:
TCP establishes communication sessions among applications on two communicating computers.
Q:
The transmission control method used by Ethernet is called collision sense multiple access with carrier detection (CSMA/CD)..
Q:
A large file is broken into hundreds of small data units called packets and each data unit is transmitted across the network.
Q:
LANs often connect WANs over a long distance such as between cities, states, or countries.
Q:
A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources.