Sei sulla pagina 1di 7

I.T.

CHAPTERS 15 AND 16
A network technician has received several reports regarding missing and corrupted
information on a company file server. Which course of action can the technician use to
investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network
access.
Enable event logging on all network devices to audit any suspicious user activity.

Audit the event logs on the server to check for unauthorized network access.

Which two advantages are attributed to a hardware firewall when compared to a


software firewall? (Choose two.)
It costs less because it is more efficient.

It does not impact the processing performance of the equipment it protects.


It always protects both the computer it is installed on as well as the rest of the
network.
It is designed to protect more than one computer.

It is a free Windows operating system component.

A company wants to configure a firewall to monitor all channels of communication and


allow only traffic that is part of a known connection. Which firewall configuration should
be deployed?
packet filtering

proxy

stateful packet inspection

stateless packet inspection

A technician has been asked to format the drives of several Windows XP computers
with a file system that can use file-level permissions to secure confidential information.
Which file system should be used by the technician?
EXT

FAT

FAT32

NTFS

A technician needs to configure wireless networking on several new laptop computers.


Which encryption method should the technician choose to achieve the best
authentication and payload security?
MD5

PGP

WEP

WPA

Which simple wireless configuration technique can make the network invisible to
unauthorized users?
Change the default password on the WAP.

Disable inactive wireless connections.

Filter all network access using MAC addresses.

Disable SSID broadcasting.

Windows XP should be updated on a regular basis. In which situation should automatic


updates be disabled?
Computers on a corporate network perform well without automatic updates because
they are protected by a firewall.
Home users should avoid automatic updates because they are protected by
Windows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control when
the updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates because
they are temporary
As part of the new security policy, a company decides to protect company data by
performing backups on a regular basis. Which backup type takes the greatest amount of
time and is commonly used in conjunction with another backup method?
differential

full

historical

incremental

Which quick solution should be tried first if a user is unable to login?


Verify that the CAPS and NUM lock keys are not on.

Reset the password for the user.

Assign the user a new username and password.

Add the user to a different group on the network.

Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals

copper strands

electricity

glass splinters

connectors

Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
Cordon off the area before crimping the cable heads.

Wear cloth gloves when working with any type of cable.

Use a magnifying glass to divert light rays when working with fiber-optic cable.

ABC Computer Company is in the process of planning a network for a new client. A
network technician has been asked to perform a physical inspection of the facilities to
determine the flow of data and protocols required by the client. What is this inspection
called?
data inspection

logical survey

plant inspection

site survey

When planning a new network, the administrator is interested in a physical topology that
is used more often than any other. Which topology is the administrator considering?
bus

mesh

ring

star

Which protocol provides secure transport of data from the company web server to
remote users?
HTTP

HTTPS

NetBEUI

DNS

The network technician is researching the best way to connect the branch offices to the
main office. What are three main considerations that the technician should remember
when choosing an Internet connection? (Choose three.)
availability

distance

operating system

protocols

reliability

speed

The network technician has been asked to share a new printer on the network using the
Add Printer wizard for Windows XP. Which path should the technician use to run the
Add Printer wizard?
Start > Run > prntwiz.exe

Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer

Start > Administrative Tools > Services > Printers and Faxes > Add Printer

Start > Control Panel > Printers and Faxes > File > Add Printer

The network administrator has physically installed wireless NICs in three new
computers. Which two additional steps will complete the installation process? (Choose
two.)
Configure the device drivers.

Configure the signal strength of the antenna.

Configure the NICs with addressing information.

Update the BIOS to support the new wireless NICs.

Verify that the computers have a valid MAC address.


After booting a computer running Windows 2000, the following message displays: "The
IP address already exists on another computer". Which two steps will quickly obtain a
new IP address from the DHCP server? (Choose two.)
run ipconfig /all

run ipconfig /displaydns

run ipconfig /flushdns

run ipconfig /release

run ipconfig /renew

ABC Company requires preventive maintenance for all local network cabling once a
month. Which task should be included in the preventive maintenance program?
Disconnect and reconnect all patch cables.

Inspect all patch cables for breaks.

Replace all labeling on the cables.

Replace all cable supports to prevent loose attachment points.

How is the built-in Windows XP firewall accessed?


Start > Control Panel > Performance and Maintenance > Security Center

Start > Control Panel > Internet Options > Security Center

Start > Control Panel > Security Center

Start > Control Panel > Network and Internet Connections > Security Center

Which two hazards exist when working with copper cabling? (Choose two.)
chemicals

copper strands

glass splinters
light

lightning

Potrebbero piacerti anche