Beruflich Dokumente
Kultur Dokumente
Assessment System
Time Remaining:
Start > Control Panel > Internet Options > Security Center
Start > Control Panel > Network and Internet Connections > Security Center
2Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
It costs less because it is more efficient.
It always protects both the computer it is installed on as well as the rest of the network.
3 A network technician has received several reports regarding missing and corrupted information on a company file server. Whic
of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network access.
Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
4Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
Computers on a corporate network perform well without automatic updates because they are protected by a firewall.
Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.
5 ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perf
physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection cal
data inspection
logical survey
plant inspection
site survey
6ABC Company requires preventive maintenance for all local network cabling once a month. Which task should be included in th
preventive maintenance program?
Disconnect and reconnect all patch cables.
7 Which simple wireless configuration technique can make the network invisible to unauthorized users?
Change the default password on the WAP.
8The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will comp
installation process? (Choose two.)
Configure the device drivers.
9 The network technician is researching the best way to connect the branch offices to the main office. What are three main
considerations that the technician should remember when choosing an Internet connection? (Choose three.)
availability
distance
operating system
protocols
reliability
speed
10Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
11 A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the t
choose to achieve the best authentication and payload security?
MD5
PGP
WEP
WPA
12Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strands
electricity
glass splinters
connectors
13 The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. W
path should the technician use to run the Add Printer wizard?
Start > Run > prntwiz.exe
Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer
Start > Administrative Tools > Services > Printers and Faxes > Add Printer
Start > Control Panel > Printers and Faxes > File > Add Printer
15 As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Whic
type takes the greatest amount of time and is commonly used in conjunction with another backup method?
differential
full
historical
incremental
Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window
Assessment System
Time Remaining:
16 Which protocol provides secure transport of data from the company web server to remote users?
HTTP
HTTPS
NetBEUI
DNS
17When planning a new network, the administrator is interested in a physical topology that is used more often than any other. W
topology is the administrator considering?
bus
mesh
ring
star
18 A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known
connection. Which firewall configuration should be deployed?
packet filtering
proxy
19A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level
permissions to secure confidential information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
20 After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another co
Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
run ipconfig /all
Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trademarks.