use at your own risk.... double check answers....
·        
Question 1
|  | 
What
  is a PDU? 
Answer | ||||
| 
 | |||||
·        
Question 2
|  | 
Which
  of the following is not a true statement regarding the function of a switch? 
Answer | ||||
| 
 | |||||
·        
Question 3
|  | 
Which
  of the following is not a function that would be found in a managed switch? 
Answer | ||||
| 
 | |||||
·        
Question 4
|  | 
Which
  layer is responsible for the encoding of signals? 
Answer | ||||
| 
 | |||||
·        
Question 5
|  | 
The
  Transport layer deals with which unit of information? 
Answer | ||||
| 
 | |||||
·        
Question 6
|  | 
In
  wireless networks, what type of media access control is used? 
Answer | ||||
| 
 | |||||
·        
Question 7
|  | 
The
  Physical layer has been divided into two sublayers, called the LLC sublayer
  and the MAC sublayer. 
Answer | ||||
| 
 | |||||
·        
Question 8
|  | 
Which
  of the following is not an Application layer protocol? 
Answer | ||||
| 
 | |||||
·        
Question 9
|  | 
What
  command would you issue from a command prompt to see a listing of the
  computers in your workgroup? 
Answer | ||||
| 
 | |||||
·        
Question 10
|  | 
What
  is the term used that defines network cabling in the work area and between
  telecommunications closets and equipment rooms? 
Answer | ||||
| 
 | |||||
·        
Question 11
|  | 
What
  component of the computer provides it with a MAC address? 
Answer | ||||
| 
 | |||||
·        
Question 12
|  | 
What
  type of routing protocol are RIP and RIPv2? 
Answer | ||||
| 
 | |||||
·        
Question 13
|  | 
What
  is the maximum cable length for both category 5e and category 6 UTP cable? 
Answer | ||||
| 
 | |||||
·        
Question 14
|  | 
What
  is the best way to eliminate the possibility of collisions in a network? 
Answer | ||||
| 
 | |||||
·        
Question 15
|  | 
Each
  interface on a router must have an IP address and what else to be able to
  communicate on the network? 
Answer | ||||
| 
 | |||||
·        
Question 16
|  | 
How
  can you find out what your MAC address is? (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 17
|  | 
Match
  each item with a statement below: 
Answer | |||||||||||||||||||||||||
| 
 | ||||||||||||||||||||||||||
·        
Question 18
|  | 
When
  a frame is received, which component reads the source and destination MAC
  addresses, looks up the destination to determine where to send the frame, and
  forwards it out the correct port? 
Answer | ||||
| 
 | |||||
·        
Question 19
|  | 
Which
  of the following is a feature of TCP? (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 20
|  | 
Because
  fiber-optic cabling uses light pulses instead of electrical signals, it is
  immune to interference and highly resistant to eavesdropping. 
Answer | ||||
| 
 | |||||
·        
Question 21
|  | 
When
  an access control list is applied on a router’s interface, that interface is
  performing a specific function on the packets that it receives. What is that
  function called? 
Answer | ||||
| 
 | |||||
·        
Question 22
|  | 
Which
  of the following is NOT a function of a hub? 
Answer | ||||
| 
 | |||||
·        
Question 23
|  | 
Which
  of the following is NOT a characteristic of Unshielded Twisted Pair cabling? 
Answer | ||||
| 
 | |||||
·        
Question 24
|  | 
The
  maximum transmission unit for Ethernet is 1518 bytes. 
Answer | ||||
| 
 | |||||
·        
Question 25
|  | 
What
  type of wiring should be used for a high-speed connection between two
  buildings? 
Answer | ||||
| 
 | |||||
·        
Question 26
|  | 
Which
  of the following are solutions to the shortage of available IPv4 addresses?
  (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 27
|  | 
Which
  of the following is not a form of electromagnetic interference, or EMI? 
Answer | ||||
| 
 | |||||
·        
Question 28
|  | 
When
  data is being prepared for transmission onto the network, it is broken into
  small pieces and a header and trailer are added to each piece to help
  identify it. What is this process called? 
Answer | ||||
| 
 | |||||
·        
Question 29
|  | 
Which
  of the following are examples of input devices? (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 30
|  | 
What
  command issued from a command prompt will display the routing table in
  Windows? 
Answer | ||||
| 
 | |||||
·        
Question 31
|  | 
What
  is the IEEE standard governing wireless networking? 
Answer | ||||
| 
 | |||||
·        
Question 32
|  | 
An
  IP address is composed of 48 bits that are grouped together into 8-bit octets
  and are represented by a decimal number from 0 to 255. 
Answer | ||||
| 
 | |||||
·        
Question 33
|  | 
Windows
  7, Windows Vista, and Windows XP are all examples of which of the following? 
Answer | ||||
| 
 | |||||
·        
Question 34
|  | 
At
  which layer would you find errors that were caused by EMI? 
Answer | ||||
| 
 | |||||
·        
Question 35
|  | 
Which
  is the strongest form of wireless security? 
Answer | ||||
| 
 | |||||
·        
Question 36
|  | 
In
  what layer does the NIC operate? 
Answer | ||||
| 
 | |||||
·        
Question 37
|  | 
You
  are the network administrator for a company and you want to separate the
  traffic from the accounting department from the rest of the network. However,
  the accounting department still needs to have access to other network
  resources. What type of network do you need to implement? 
Answer | ||||
| 
 | |||||
·        
Question 38
|  | 
Which
  component, located on the motherboard, carries out all the instructions
  provided by computer programs? 
Answer | ||||
| 
 | |||||
·        
Question 39
|  | 
What
  is the main disadvantage of cable modem networking? 
Answer | ||||
| 
 | |||||
·        
Question 40
|  | 
Put
  the layers of the OSI model in order from layer 7 to layer 1. a. Presentation b. Network c. Physical d. Data Link e. Transport f. Application g. Session 
Answer | ||||
| 
 | |||||
·        
Question 41
|  | 
Answer | |||||||||||||||||||||||||
| 
 | ||||||||||||||||||||||||||
·        
Question 42
|  | 
One
  of the problems that can occur in the Network layer is the incorrect
  configuration of a hosts IP address. 
Answer | ||||
| 
 | |||||
·        
Question 43
|  | 
IPX/SPX
  is considered the protocol suite of the Internet, and it is the most widely
  used protocol suite in LANs. 
Answer | ||||
| 
 | |||||
·        
Question 44
|  | 
You
  are building a gaming computer and you want to install a dedicated graphics
  card that has a fast GPU and 1GB of memory onboard. You need to make sure
  that you have the right connector available on your motherboard. What type of
  connector would be appropriate? 
Answer | ||||
| 
 | |||||
·        
Question 45
|  | 
Which
  of the following categories of UTP cabling are considered to be data grade as
  specified by ANSI/TIA/EIA? (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 46
|  | 
You
  are the network administrator for a company that uses a private addressing
  scheme for its internal network. You have 300 workstations that regularly
  access the Internet. What process must be in operation on your network to
  allow all the workstations to have access to the Internet using only one
  public IP address? 
Answer | ||||
| 
 | |||||
·        
Question 47
|  | 
Each
  component of a computer is designed to perform only one specific task—either input,
  processing, or output. 
Answer | ||||
| 
 | |||||
·        
Question 48
|  | 
Which
  part of a computer’s IP address configuration indicates the portion of the
  address that specifies the network ID? 
Answer | ||||
| 
 | |||||
·        
Question 49
|  | 
What
  is the purpose of the default route? 
Answer | ||||
| 
 | |||||
·        
Question 50
|  | 
What
  does a switch store in its switching table? 
Answer | ||||
| 
 | |||||
·        
Question 51
|  | 
A
  collision can occur on a switch only if the switch is operating in
  full-duplex mode. 
Answer | ||||
| 
 | |||||
·        
Question 52
|  | 
How
  many bits are available in an IPv6 network for creating subnets when the
  prefix is /48 and the host ID is 64 bits? 
Answer | ||||
| 
 | |||||
·        
Question 53
|  | 
Match
  each item with a statement below: 
Answer | |||||||||||||||||||||||||
| 
 | ||||||||||||||||||||||||||
·        
Question 54
|  | 
The
  entrance facility is the place where the connection to a WAN is located. It
  is basically the point where the LAN begins and ends. What is another name
  for this point? 
Answer | ||||
| 
 | |||||
·        
Question 55
|  | 
DNS
  is a protocol that automatically provides a computer with its IP address
  configuration. 
Answer | ||||
| 
 | |||||
·        
Question 56
|  | 
What
  is one of the disadvantages of a server-based network compared to a
  peer-to-peer network? 
Answer | ||||
| 
 | |||||
·        
Question 57
|  | 
Communications
  through a router are noticeably faster than communications through a switch. 
Answer | ||||
| 
 | |||||
·        
Question 58
|  | 
Access
  control lists can be configured based on which of the following? (Choose all
  that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 59
|  | 
A
  signal has just been received from the WAN link on your network. Using the
  given components, which of the following shows the path that the signal would
  take from the WAN to a workstation on your network? Assume all components are
  used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area 
Answer | ||||
| 
 | |||||
·        
Question 60
|  | 
Which
  of the following is not one of the main differences between the types of
  network cabling? 
Answer | ||||
| 
 | |||||
·        
Question 61
|  | 
There
  are two basic categories of physical cabling used in Ethernet networks. They
  are copper wire and fiber optic. 
Answer | ||||
| 
 | |||||
·        
Question 62
|  | 
What
  type of hacker uses a scanning device to find unsecured wireless networks and
  break into those networks? 
Answer | ||||
| 
 | |||||
·        
Question 63
|  | 
Which
  layer of the OSI model is responsible for encryption and decryption? 
Answer | ||||
| 
 | |||||
·        
Question 64
|  | 
You
  cannot connect a hub to another hub unless it has an uplink port. 
Answer | ||||
| 
 | |||||
·        
Question 65
|  | 
Which
  of the following is NOT an advantage of a physical star? 
Answer | ||||
| 
 | |||||
·        
Question 66
|  | 
What
  does the Transport layer use to make sure that a message is reassembled
  correctly on the receiving device? 
Answer | ||||
| 
 | |||||
·        
Question 67
|  | 
You’re
  the network administrator for a company located in Arizona that has just
  opened an office in Texas. You need to make sure that the two locations can
  communicate. What type of network are you implementing? 
Answer | ||||
| 
 | |||||
·        
Question 68
|  | 
The
  Transport layer segments data into smaller chunks, the size of which is
  determined by which of the following? 
Answer | ||||
| 
 | |||||
·        
Question 69
|  | 
What
  is the maximum bandwidth for a network cabled using category 5e UTP cable? 
Answer | ||||
| 
 | |||||
·        
Question 70
|  | 
You
  are working at the help desk and you get a message that a user cannot access
  the Internet. You open a command prompt, ping the workstation’s IP address,
  and get a response.  You ask the user to try the Internet again. He does
  so with the same result— no connection.  Which type of device is most
  likely to be the problem? 
Answer | ||||
| 
 | |||||
·        
Question 71
|  | 
How
  many host addresses are available on a Class C network? 
Answer | ||||
| 
 | |||||
·        
Question 72
|  | 
Which
  protocol is responsible for determining the MAC address associated with each
  IP address and keeping a table of its results? 
Answer | ||||
| 
 | |||||
·        
Question 73
|  | 
In
  a token ring network, what is the central device called? 
Answer | ||||
| 
 | |||||
·        
Question 74
|  | 
Which
  of the following is the physical topology that is daisy-chained like a bus
  and in which the cabling is brought around from the last device to the first
  device? 
Answer | ||||
| 
 | |||||
·        
Question 75
|  | 
When
  using UTP cabling, what is the maximum cable length that can be used from the
  NIC to a hub or switch? 
Answer | ||||
| 
 | |||||
·        
Question 1
4 out of 4 points
|  | 
If
  you need to implement a VPN on a Windows Server 2008 system, what server role
  must be installed to access routing and remote access services? 
Answer | ||||
| 
 | |||||
·        
Question 2
4 out of 4 points
|  | 
In
  a small business network, the router usually takes on the responsibilities of
  many roles, which include a firewall as well as a DHCP server. 
Answer | ||||
| 
 | |||||
·        
Question 3
4 out of 4 points
|  | 
Which
  of the following terms describes the category of cloud computing in which a
  customer develops applications using development tools and infrastructure
  provided by the service provider? 
Answer | ||||
| 
 | |||||
·        
Question 4
4 out of 4 points
|  | 
What
  are the chunks called into which the available storage space on a disk drive
  is broken? 
Answer | ||||
| 
 | |||||
·        
Question 5
4 out of 4 points
|  | 
You
  are a network architect for an IT consulting company. One of your clients
  needs a WAN connection and has asked you about the disadvantage of a
  packet-switched WAN method. Which of the following is a disadvantage that
  applies? 
Answer | ||||
| 
 | |||||
·        
Question 6
0 out of 4 points
|  | 
A
  SOHO router is designed to perform which of the following services? (Choose
  all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 7
4 out of 4 points
|  | 
An
  event log entry that is an error is marked with a red circle with a white
  exclamation point in the center. 
Answer | ||||
| 
 | |||||
·        
Question 8
4 out of 4 points
|  | 
Answer | |||||||||||||||||||||||||
| 
 | ||||||||||||||||||||||||||
·        
Question 9
4 out of 4 points
|  | 
What
  is the process called that grants or denies a user’s access to network
  resources? 
Answer | ||||
| 
 | |||||
·        
Question 10
4 out of 4 points
|  | 
When
  using BitLocker to encrypt your entire disk, which mode must you use if your
  system is not configured for TPM support? 
Answer | ||||
| 
 | |||||
·        
Question 11
4 out of 4 points
|  | 
Which
  of the following is not a feature that you should consider when choosing a
  new switch for a small business? 
Answer | ||||
| 
 | |||||
·        
Question 12
4 out of 4 points
|  | 
A
  Trojan is a self-replicating program that masks itself as a useful program
  but is actually a type of malware. 
Answer | ||||
| 
 | |||||
·        
Question 13
4 out of 4 points
|  | 
The
  creator of a HomeGroup has the ability to change the randomly generated
  password to a more user-friendly password. 
Answer | ||||
| 
 | |||||
·        
Question 14
0 out of 4 points
|  | 
What
  tool would you use to view error messages that are generated by system
  services or applications? 
Answer | ||||
| 
 | |||||
·        
Question 15
4 out of 4 points
|  | 
Which
  of the following is a scanner used as a tool to determine what possible
  points of entry exist that are open and vulnerable on your system? 
Answer | ||||
| 
 | |||||
·        
Question 16
4 out of 4 points
|  | 
A
  disk must be formatted as what type of disk if you want to access additional
  features such as disk spanning? 
Answer | ||||
| 
 | |||||
·        
Question 17
4 out of 4 points
|  | 
In
  a file system that uses FAT or FAT32, the only file security option that is
  available is the sharing permissions. 
Answer | ||||
| 
 | |||||
·        
Question 18
4 out of 4 points
|  | 
How
  many disks are needed to implement a RAID 1 + 0? 
Answer | ||||
| 
 | |||||
·        
Question 19
4 out of 4 points
|  | 
In
  regards to a user account, what does a white circle with a black arrow
  indicate? 
Answer | ||||
| 
 | |||||
·        
Question 20
4 out of 4 points
|  | 
The
  802.11i standard is the newest version of wireless security that uses more
  advanced encryption methods than the previous versions. What is it more
  commonly referred to as? 
Answer | ||||
| 
 | |||||
·        
Question 21
4 out of 4 points
|  | 
Which
  one of the following is NOT a typical SONET data rate? 
Answer | ||||
| 
 | |||||
·        
Question 22
4 out of 4 points
|  | 
A
  user logs on to her account and is able to makes changes to her desktop, like
  adding a background and screen saver. However, when she logs off and logs
  back on, the desktop reverts to its original configuration. What type of user
  profile does this user have? 
Answer | ||||
| 
 | |||||
·        
Question 23
0 out of 4 points
|  | 
What
  is RAID level 1 also called? 
Answer | ||||
| 
 | |||||
·        
Question 24
4 out of 4 points
|  | 
What
  is CRM software? 
Answer | ||||
| 
 | |||||
·        
Question 25
0 out of 4 points
|  | 
Which
  of the following groups are special identity groups? (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 26
4 out of 4 points
|  | 
Which
  of the following is a VPN mode that is usually implemented to give mobile
  users access to the network? 
Answer | ||||
| 
 | |||||
·        
Question 27
0 out of 4 points
|  | 
When
  dealing with permissions in Linux, what are the three user types that can be
  assigned permissions? (Choose three.) 
Answer | ||||
| 
 | |||||
·        
Question 28
4 out of 4 points
|  | 
Traceroute
  would be best suited for which of the following tasks? 
Answer | ||||
| 
 | |||||
·        
Question 29
4 out of 4 points
|  | 
In
  the problem-solving process, you should always devise a solution to the
  problem you are facing prior to determining the scope of the problem. 
Answer | ||||
| 
 | |||||
·        
Question 30
4 out of 4 points
|  | 
Which
  edition of Windows Server 2008 includes support for up to 64 processors and
  provides unlimited virtual instances? 
Answer | ||||
| 
 | |||||
·        
Question 31
4 out of 4 points
|  | 
What
  is a partial copy of a VM that is used to restore it to a previous state? 
Answer | ||||
| 
 | |||||
·        
Question 32
4 out of 4 points
|  | 
You
  have just connected a brand new workstation to your local network. As per
  company policy, you have used a static IP configuration. However, all
  attempts to reach the Internet from the workstation fail. You have verified
  that you can communicate with servers and other workstations on the local
  network, and that you are the only one having an issue reaching the Internet.
  What is most likely the issue? 
Answer | ||||
| 
 | |||||
·        
Question 33
4 out of 4 points
|  | 
What
  kind of software would you use to view and troubleshoot protocol specific
  problems such as TCP retries caused by missed acknowledgements, or duplicate
  acknowledgements that cause network slow-down? 
Answer | ||||
| 
 | |||||
·        
Question 34
4 out of 4 points
|  | 
What
  does the ping message “Destination net unreachable” mean? 
Answer | ||||
| 
 | |||||
·        
Question 35
4 out of 4 points
|  | 
The
  plain old telephone service is a good example of what kind of WAN technology? 
Answer | ||||
| 
 | |||||
·        
Question 36
4 out of 4 points
|  | 
In
  Linux, what is the command for viewing a file’s contents onscreen? 
Answer | ||||
| 
 | |||||
·        
Question 37
4 out of 4 points
|  | 
Most
  small businesses require a high level of security including encryption
  technologies and complex network connections. 
Answer | ||||
| 
 | |||||
·        
Question 38
0 out of 4 points
|  | 
Firewall
  rules can be based on which of the following properties? (Choose all that
  apply.) 
Answer | ||||
| 
 | |||||
·        
Question 39
4 out of 4 points
|  | 
Select
  the true statement regarding analog and digital signals. 
Answer | ||||
| 
 | |||||
·        
Question 40
4 out of 4 points
|  | 
Windows
  can be installed on an extended partition that has been formatted with the
  NTFS file system. 
Answer | ||||
| 
 | |||||
·        
Question 41
4 out of 4 points
|  | 
Which
  of the following is NOT a Linux file system? 
Answer | ||||
| 
 | |||||
·        
Question 42
0 out of 4 points
|  | 
If
  you want to implement fault-tolerance on your network, what type of RAID
  would you use on the drives that contain data? 
Answer | ||||
| 
 | |||||
·        
Question 43
4 out of 4 points
|  | 
You
  don’t need to physically secure your servers as long as you use a good strong
  password for your accounts. 
Answer | ||||
| 
 | |||||
·        
Question 44
4 out of 4 points
|  | 
Your
  local ISP has provided you with a dedicated line that has a Committed
  Information Rate of 1.54 Mbps. What does this mean? 
Answer | ||||
| 
 | |||||
·        
Question 45
4 out of 4 points
|  | 
The
  ping command is used to determine the path between two devices. 
Answer | ||||
| 
 | |||||
·        
Question 46
4 out of 4 points
|  | 
When
  a disk is formatted, it is impossible to recover the data that was on the
  disk.. 
Answer | ||||
| 
 | |||||
·        
Question 47
4 out of 4 points
|  | 
The
  company you work for currently has ISDN service in place. Your supervisor
  wishes to know what sort of ISDN service is being used so that better
  alternatives can be considered. He tells you that the service has two
  B-Channels and a D-Channel. What ISDN format do you have? 
Answer | ||||
| 
 | |||||
·        
Question 48
4 out of 4 points
|  | 
Before
  you purchase any software for a small business, especially the OS, you should
  be aware of the number of users that are allowed to access the software. What
  document will give you that information? 
Answer | ||||
| 
 | |||||
·        
Question 49
4 out of 4 points
|  | 
You
  recently completed a network overhaul over the weekend. Everything seems to
  be functioning properly until you receive a swarm of help desk support
  requests, all originating from one specific floor in your building. After a
  few minutes on the phone with those affected, you determine that no one has
  indicator lights active on their NICs. What is most likely the problem? 
Answer | ||||
| 
 | |||||
·        
Question 50
4 out of 4 points
|  | 
Which
  command will display the configured IP address, default gateway, and DNS
  servers for a Windows workstation? 
Answer | ||||
| 
 | |||||
·        
Question 51
4 out of 4 points
|  | 
You
  have been asked to install a VPN remote access solution using Windows
  Server.What do you need to install? 
Answer | ||||
| 
 | |||||
·        
Question 52
0 out of 4 points
|  | 
You
  are creating a new group for the Sales department. All of the users that will
  be in this group will need to have access to the same resources. What scope
  would you use for this group? 
Answer | ||||
| 
 | |||||
·        
Question 53
4 out of 4 points
|  | 
The
  ultimate goal of network security is to protect which of the following? 
Answer | ||||
| 
 | |||||
·        
Question 54
4 out of 4 points
|  | 
A
  router is considered to be a CSU/DSU. 
Answer | ||||
| 
 | |||||
·        
Question 55
4 out of 4 points
|  | 
Which
  of the following protocols is NOT used for Windows 7 VPN connections? 
Answer | ||||
| 
 | |||||
·        
Question 56
4 out of 4 points
|  | 
What
  is the native file-sharing protocol in Linux? 
Answer | ||||
| 
 | |||||
·        
Question 57
4 out of 4 points
|  | 
Virtualization
  is designed for testing and development purposes only. 
Answer | ||||
| 
 | |||||
·        
Question 58
4 out of 4 points
|  | 
You’re
  the network administrator for a large bean-bag chair company. You are
  presenting to your supervisor several reasons to make use of cloud computing
  for handling data processing. Which answer would be a valid benefit of using
  cloud computing? 
Answer | ||||
| 
 | |||||
·        
Question 59
4 out of 4 points
|  | 
What
  does the ping message “Destination host unreachable” message mean? 
Answer | ||||
| 
 | |||||
·        
Question 60
4 out of 4 points
|  | 
Which
  statement about Multiprotocol Label Switching (MPLS) is true? 
Answer | ||||
| 
 | |||||
·        
Question 61
0 out of 4 points
|  | 
Which
  of the following are potential sources of interference in a wireless network?
  (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 62
4 out of 4 points
|  | 
When
  a file is encrypted, what color does the file name appear in Windows
  Explorer? 
Answer | ||||
| 
 | |||||
·        
Question 63
4 out of 4 points
|  | 
If
  you need to limit the amount of data users can store on a volume, you would
  implement which of the following? 
Answer | ||||
| 
 | |||||
·        
Question 64
4 out of 4 points
|  | 
Part
  of SONET’s flexibility comes from its ability to be arranged in several
  different physical topologies. Which of the following is NOT a possible SONET
  topology? 
Answer | ||||
| 
 | |||||
·        
Question 65
4 out of 4 points
|  | 
You
  receive a phone call from a co-worker telling you that “the network is down.”
  Just as you are about to look into the issue, you receive several more phone
  calls from other co-workers. Using the problem-solving process, what must be
  done first to effectively troubleshoot the issue? 
Answer | ||||
| 
 | |||||
·        
Question 66
0 out of 4 points
|  | 
Which
  of the following are standard NTFS permissions? 
Answer | ||||
| 
 | |||||
·        
Question 67
4 out of 4 points
|  | 
Which
  of the following is not a requirement for most small business networks? 
Answer | ||||
| 
 | |||||
·        
Question 68
4 out of 4 points
|  | 
If
  a problem occurs after a successful login, Last Known Good Configuration will
  fix the issue. 
Answer | ||||
| 
 | |||||
·        
Question 69
4 out of 4 points
|  | 
What
  method does the CPU use to divide its computing cycles between more than one
  process? 
Answer | ||||
| 
 | |||||
·        
Question 70
4 out of 4 points
|  | 
For
  a computer to connect to a HomeGroup, it must have certain features enabled
  or configured correctly. Which of the following is not necessary to join a
  HomeGroup? 
Answer | ||||
| 
 | |||||
·        
Question 71
4 out of 4 points
|  | 
Select
  the utility inside of Windows that allows the user to recover a previous
  system state. This utility monitors drives and partitions, as well as
  registry settings and system files. 
Answer | ||||
| 
 | |||||
·        
Question 72
4 out of 4 points
|  | 
A
  protocol analyzer, such as Wireshark, gives the ability to listen in on
  network traffic as it moves through the Application layer to the Data Link
  layer and vice versa.. 
Answer | ||||
| 
 | |||||
·        
Question 73
0 out of 4 points
|  | 
Which
  of the following are case sensitive? (Choose all that apply.) 
Answer | ||||
| 
 | |||||
·        
Question 74
4 out of 4 points
|  | 
Which
  of the following should not be a concern when discerning the level of
  security that is required in a network? 
Answer | ||||
| 
 | |||||
·        
Question 75
0 out of 4 points
|  | 
Which
  of the following can be used to secure data on disk drives? (Choose all that
  apply.) 
Answer | ||||
| 
 | |||||

 
The Eight-Wheel Classic - TITIAN Arts
ReplyDeleteThe eight-wheel classic bicycle https://sol.edu.kg/ is septcasino.com available in six nba매니아 sizes. The Bicycle Wheel is ford escape titanium a classic bicycle made in USA, but there 출장샵 are three variations in