Beruflich Dokumente
Kultur Dokumente
hash encoding
logging and auditing
password protection
symmetric encryption
After a technician collects information from the computer, which two sources can
provide the technician with possible solutions for various types of network-
related problems? (Choose two.)
paperwork that is provided to customers
the manufacturer FAQ for network devices
firewall logs
network device logs
technical websites
2
What is a disadvantage of configuring a firewall using permissive settings?
Devices are exposed to attack.
Packet transmission becomes complicated, requiring explicit access
permission for all packets.
The extra ports that are used by various applications are closed.
The settings may cause a user to be locked out of the system.
3
Which method of filtering traffic is used to monitor established network
connections to allow only packets from established network connections?
packet filter
proxy firewall
stateful packet inspection
wireless NICs
4
Which Windows XP command performs a data backup?
BACKUP
BUP
NTBACKUP
XPBACKUP
5
A technician has been asked to format the drives of several Windows XP computers
with a file system that can use file-level permissions to secure confidential
information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
6
Which physical security technology uses an embedded integrated circuit chip to
store data safely and is commonly used in secure ID badges?
smart card
security key fob
storage area network
biometric device
7
Which right can only be granted by enabling the Full Control file-level
permission?
change the permissions of a file
delete a file
overwrite a file
run a file
8
Which two advantages are attributed to a hardware firewall when compared to a
software firewall? (Choose two.)
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest
of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
9
What is the default setting for Windows XP operating system updates?
automatic
only download updates
notify me
manual
10
After analyzing and researching the problem by visiting several technical
websites, a technician was unable to help a user to log in. Later, the user
rebooted the computer and was able to log in. Which step did the technician omit
during the troubleshooting process?
closing the issue with the customer
gathering data from the computer
gathering information from the user
trying quick solutions
11
Which characteristic of an application is used by the Windows XP firewall to
determine whether the application is allowed to access the network?
file permission
port number
IRQ
username
12
Which encryption technique uses a mathematical function to create a numeric value
unique to the data?
asymmetric encryption
hash encoding
VPN
WTLS
13
Which technique may be used to generate a message digest from a hash encoding
process?
the use of a combination of identical encryption keys
the use of a mathematical function to generate a corresponding text value
that is unique to the message
the use of the SHA or MD5 algorithms
the use of a key that is agreed to by the sender and receiver
14
A technician needs to configure wireless networking on several new laptop
computers. Which encryption method should the technician choose to achieve the
best authentication and payload security?
MD5
PGP
WEP
WPA
15
Which two methods help protect network cables? (Choose two.)
enclosing the cables in conduits
enclosing the cables in cable locks
routing the cables inside the walls of a building
leave cables exposed to reveal tampering
using RFID tags
17
A technician has been asked to format the drives of several Windows XP computers
with a file system that can use file-level permissions to secure confidential
information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
18
Windows XP should be updated on a regular basis. In which situation should
automatic updates be disabled?
Computers on a corporate network perform well without automatic updates
because they are protected by a firewall.
Home users should avoid automatic updates because they are protected by
Windows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control when
the updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates
because they are temporary users.
19
A company wants to configure a firewall to monitor all channels of communication
and allow only traffic that is part of a known connection. Which firewall
configuration should be deployed?
packet filtering
proxy
stateful packet inspection
stateless packet inspection
20
Which two advantages are attributed to a hardware firewall when compared to a
software firewall? (Choose two.)
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest
of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
21
Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strands
electricity
glass splinters
connectors
ABC Company requires preventive maintenance for all local network cabling once a
month. Which task should be included in the preventive maintenance program?
Disconnect and reconnect all patch cables.
Inspect all patch cables for breaks.
Replace all labeling on the cables.
Replace all cable supports to prevent loose attachment points.
2
A network technician has received several reports regarding missing and corrupted
information on a company file server. Which course of action can the technician
use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the
day.
Enable event logging on each user computer to check for unauthorized network
access.
Enable event logging on all network devices to audit any suspicious user
activity.
Audit the event logs on the server to check for unauthorized network access.
3
ABC Computer Company is in the process of planning a network for a new client. A
network technician has been asked to perform a physical inspection of the
facilities to determine the flow of data and protocols required by the client.
What is this inspection called?
data inspection
logical survey
plant inspection
site survey
4
A technician needs to configure wireless networking on several new laptop
computers. Which encryption method should the technician choose to achieve the
best authentication and payload security?
MD5
PGP
WEP
WPA
5
Which protocol provides secure transport of data from the company web server to
remote users?
HTTP
HTTPS
NetBEUI
DNS
6
Which two hazards exist when working with copper cabling? (Choose two.)
chemicals
copper strands
glass splinters
light
lightning
7
Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
Cordon off the area before crimping the cable heads.
Wear cloth gloves when working with any type of cable.
Use a magnifying glass to divert light rays when working with fiber-optic
cable.
8
The network technician is researching the best way to connect the branch offices
to the main office. What are three main considerations that the technician should
remember when choosing an Internet connection? (Choose three.)
availability
distance
operating system
protocols
reliability
speed
9
How is the built-in Windows XP firewall accessed?
Start > Control Panel > Performance and Maintenance > Security Center
Start > Control Panel > Internet Options > Security Center
Start > Control Panel > Security Center
Start > Control Panel > Network and Internet Connections > Security Center
10
As part of the new security policy, a company decides to protect company data by
performing backups on a regular basis. Which backup type takes the greatest amount
of time and is commonly used in conjunction with another backup method?
differential
full
historical
incremental
11
After booting a computer running Windows 2000, the following message displays:
"The IP address already exists on another computer". Which two steps will quickly
obtain a new IP address from the DHCP server? (Choose two.)
run ipconfig /all
run ipconfig /displaydns
run ipconfig /flushdns
run ipconfig /release
run ipconfig /renew
12
The network technician has been asked to share a new printer on the network using
the Add Printer wizard for Windows XP. Which path should the technician use to run
the Add Printer wizard?
Start > Run > prntwiz.exe
Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer
Start > Administrative Tools > Services > Printers and Faxes > Add Printer
Start > Control Panel > Printers and Faxes > File > Add Printer
13
Which quick solution should be tried first if a user is unable to login?
Verify that the CAPS and NUM lock keys are not on.
Reset the password for the user.
Assign the user a new username and password.
Add the user to a different group on the network.
14
Which simple wireless configuration technique can make the network invisible to
unauthorized users?
Change the default password on the WAP.
Disable inactive wireless connections.
Filter all network access using MAC addresses.
Disable SSID broadcasting.
15
The network administrator has physically installed wireless NICs in three new
computers. Which two additional steps will complete the installation process?
(Choose two.)
Configure the device drivers.
Configure the signal strength of the antenna.
Configure the NICs with addressing information.
Update the BIOS to support the new wireless NICs.
Verify that the computers have a valid MAC address.