Saturday, September 22, 2012

networking final


·       Finale I got an A whoo hoo


  Question 1
4 out of 4 points

If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
network policy and access services
·         Question 2
4 out of 4 points

In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 3
4 out of 4 points

Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
hosted platforms
·         Question 4
4 out of 4 points

What are the chunks called into which the available storage space on a disk drive is broken?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
sectors
·         Question 5
4 out of 4 points

You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
shared bandwidth
·         Question 6
0 out of 4 points

A SOHO router is designed to perform which of the following services? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
NAT

Description: https://ctc.blackboard.com/images/spacer.gif d.  
DHCP

 
·         Question 7
4 out of 4 points

An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 8
4 out of 4 points

Answer
Question
Selected Match
can be used to create a RAID
Description: https://ctc.blackboard.com/images/spacer.gif c.  
dynamic disk
if the primary server fails, the secondary server takes over
Description: https://ctc.blackboard.com/images/spacer.gif d.  
failover cluster
can be divided in up to four primary partitions
Description: https://ctc.blackboard.com/images/spacer.gif e.  
basic disk
defines a user’s environment
Description: https://ctc.blackboard.com/images/spacer.gif f.  
local profile
multiple servers acting as a single server
Description: https://ctc.blackboard.com/images/spacer.gif b.  
load-balancing cluster
power device that provides fault tolerance through battery backup
Description: https://ctc.blackboard.com/images/spacer.gif g.  
uninterruptible power supply
partition that contains the boot loader
Description: https://ctc.blackboard.com/images/spacer.gif j.  
system partition
action that a user can perform on a computer
Description: https://ctc.blackboard.com/images/spacer.gif a.  
right
can be made the active partition
Description: https://ctc.blackboard.com/images/spacer.gif i.  
primary partition
can only be divided into logical drives
Description: https://ctc.blackboard.com/images/spacer.gif h.  
extended partition
·         Question 9
4 out of 4 points

What is the process called that grants or denies a user’s access to network resources?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
authorization
·         Question 10
4 out of 4 points

When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
USB key mode
·         Question 11
4 out of 4 points

Which of the following is not a feature that you should consider when choosing a new switch for a small business?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
VPN support
·         Question 12
4 out of 4 points

A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 13
4 out of 4 points

The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 14
0 out of 4 points

What tool would you use to view error messages that are generated by system services or applications?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Performance Monitor
·         Question 15
4 out of 4 points

Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Port
·         Question 16
4 out of 4 points

A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
dynamic
·         Question 17
4 out of 4 points

In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 18
4 out of 4 points

How many disks are needed to implement a RAID 1 + 0?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
4
·         Question 19
4 out of 4 points

In regards to a user account, what does a white circle with a black arrow indicate?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
The account is disabled.
·         Question 20
4 out of 4 points

The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
WPA2
·         Question 21
4 out of 4 points

Which one of the following is NOT a typical SONET data rate?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
OC-9001
·         Question 22
4 out of 4 points

A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
mandatory
·         Question 23
0 out of 4 points

What is RAID level 1 also called?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
disk striping
·         Question 24
4 out of 4 points

What is CRM software?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
software that is used to keep track of customer information, including contact information and appointments
·         Question 25
0 out of 4 points

Which of the following groups are special identity groups? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
authenticated users

Description: https://ctc.blackboard.com/images/spacer.gif c.  
guests

Description: https://ctc.blackboard.com/images/spacer.gif e.  
print operators

 
·         Question 26
4 out of 4 points

Which of the following is a VPN mode that is usually implemented to give mobile users access to the network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
client-to-gateway
·         Question 27
0 out of 4 points

When dealing with permissions in Linux, what are the three user types that can be assigned permissions? (Choose three.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Group

Description: https://ctc.blackboard.com/images/spacer.gif d.  
Creator

Description: https://ctc.blackboard.com/images/spacer.gif e.  
Owner

 
·         Question 28
4 out of 4 points

Traceroute would be best suited for which of the following tasks?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
locating bottlenecks in a network
·         Question 29
4 out of 4 points

In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 30
4 out of 4 points

Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Datacenter Edition
·         Question 31
4 out of 4 points

What is a partial copy of a VM that is used to restore it to a previous state?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
snapshot
·         Question 32
4 out of 4 points

You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
incorrectly configured gateway address
·         Question 33
4 out of 4 points

What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
protocol analyzer
·         Question 34
4 out of 4 points

What does the ping message “Destination net unreachable” mean?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
A router in the path from the source to the destination determined that the destination network does not exist.
·         Question 35
4 out of 4 points

The plain old telephone service is a good example of what kind of WAN technology?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
circuit switched
·         Question 36
4 out of 4 points

In Linux, what is the command for viewing a file’s contents onscreen?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
cat
·         Question 37
4 out of 4 points

Most small businesses require a high level of security including encryption technologies and complex network connections.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 38
0 out of 4 points

Firewall rules can be based on which of the following properties? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
operating system

Description: https://ctc.blackboard.com/images/spacer.gif d.  
context

Description: https://ctc.blackboard.com/images/spacer.gif e.  
protocol

 
·         Question 39
4 out of 4 points

Select the true statement regarding analog and digital signals.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
·         Question 40
4 out of 4 points

Windows can be installed on an extended partition that has been formatted with the NTFS file system.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 41
4 out of 4 points

Which of the following is NOT a Linux file system?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
SFS
·         Question 42
0 out of 4 points

If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain data?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
1
·         Question 43
4 out of 4 points

You don’t need to physically secure your servers as long as you use a good strong password for your accounts.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 44
4 out of 4 points

Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
1.54 Mbps is the guaranteed minimum transmission rate.
·         Question 45
4 out of 4 points

The ping command is used to determine the path between two devices.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 46
4 out of 4 points

When a disk is formatted, it is impossible to recover the data that was on the disk..
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 47
4 out of 4 points

The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Basic Rate Interface (BRI)
·         Question 48
4 out of 4 points

Before you purchase any software for a small business, especially the OS, you should be aware of the number of users that are allowed to access the software. What document will give you that information?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
EULA
·         Question 49
4 out of 4 points

You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
A network switch has not been powered on.
·         Question 50
4 out of 4 points

Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
ipconfig /all
·         Question 51
4 out of 4 points

You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Routing and Remote Access Service (RRAS)
·         Question 52
0 out of 4 points

You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
domain local
·         Question 53
4 out of 4 points

The ultimate goal of network security is to protect which of the following?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
all of the above
·         Question 54
4 out of 4 points

A router is considered to be a CSU/DSU.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 55
4 out of 4 points

Which of the following protocols is NOT used for Windows 7 VPN connections?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
SMTP
·         Question 56
4 out of 4 points

What is the native file-sharing protocol in Linux?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
NFS
·         Question 57
4 out of 4 points

Virtualization is designed for testing and development purposes only.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 58
4 out of 4 points

You’re the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
reduced physical plant costs
·         Question 59
4 out of 4 points

What does the ping message “Destination host unreachable” message mean?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
The pinged IP address is on the same network, but an ARP reply was not received.
·         Question 60
4 out of 4 points

Which statement about Multiprotocol Label Switching (MPLS) is true?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
MPLS works with any network layer protocol.
·         Question 61
0 out of 4 points

Which of the following are potential sources of interference in a wireless network? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
microwave oven

Description: https://ctc.blackboard.com/images/spacer.gif c.  
cordless phone

Description: https://ctc.blackboard.com/images/spacer.gif d.  
television

Description: https://ctc.blackboard.com/images/spacer.gif e.  
electric lights

 
·         Question 62
4 out of 4 points

When a file is encrypted, what color does the file name appear in Windows Explorer?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
green
·         Question 63
4 out of 4 points

If you need to limit the amount of data users can store on a volume, you would implement which of the following?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
disk quotas
·         Question 64
4 out of 4 points

Part of SONET’s flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
fault tolerant bus
·         Question 65
4 out of 4 points

You receive a phone call from a co-worker telling you that “the network is down.” Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif b.  
Determine what the problem is, and then figure out who has been affected on your network.
·         Question 66
0 out of 4 points

Which of the following are standard NTFS permissions?
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
Execute

Description: https://ctc.blackboard.com/images/spacer.gif d.  
Change

Description: https://ctc.blackboard.com/images/spacer.gif e.  
List Folder Contents

 
·         Question 67
4 out of 4 points

Which of the following is not a requirement for most small business networks?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
complex WAN environment
·         Question 68
4 out of 4 points

If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif False
·         Question 69
4 out of 4 points

What method does the CPU use to divide its computing cycles between more than one process?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
time slicing
·         Question 70
4 out of 4 points

For a computer to connect to a HomeGroup, it must have certain features enabled or configured correctly. Which of the following is not necessary to join a HomeGroup?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif d.  
DHCP
·         Question 71
4 out of 4 points

Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
System Restore
·         Question 72
4 out of 4 points

A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa..
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif True
·         Question 73
0 out of 4 points

Which of the following are case sensitive? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
Linux password

Description: https://ctc.blackboard.com/images/spacer.gif b.  
Linux logon name

 
·         Question 74
4 out of 4 points

Which of the following should not be a concern when discerning the level of security that is required in a network?
Answer
Selected Answer:
Description: https://ctc.blackboard.com/images/spacer.gif c.  
how difficult it would be to enforce a password policy
·         Question 75
0 out of 4 points

Which of the following can be used to secure data on disk drives? (Choose all that apply.)
Answer
Selected Answers:
Description: https://ctc.blackboard.com/images/spacer.gif a.  
VPN

Description: https://ctc.blackboard.com/images/spacer.gif b.  
IPSec

Description: https://ctc.blackboard.com/images/spacer.gif e.  
BitLocker