· Finale I got an A whoo hoo
Question 1
4 out of 4 points
|
If
you need to implement a VPN on a Windows Server 2008 system, what server role
must be installed to access routing and remote access services?
Answer
|
||||
|
·
Question 2
4 out of 4 points
|
In
a small business network, the router usually takes on the responsibilities of
many roles, which include a firewall as well as a DHCP server.
Answer
|
||||
|
·
Question 3
4 out of 4 points
|
Which
of the following terms describes the category of cloud computing in which a
customer develops applications using development tools and infrastructure
provided by the service provider?
Answer
|
||||
|
·
Question 4
4 out of 4 points
|
What
are the chunks called into which the available storage space on a disk drive
is broken?
Answer
|
||||
|
·
Question 5
4 out of 4 points
|
You
are a network architect for an IT consulting company. One of your clients
needs a WAN connection and has asked you about the disadvantage of a
packet-switched WAN method. Which of the following is a disadvantage that
applies?
Answer
|
||||
|
·
Question 6
0 out of 4 points
|
A
SOHO router is designed to perform which of the following services? (Choose
all that apply.)
Answer
|
||||
|
·
Question 7
4 out of 4 points
|
An
event log entry that is an error is marked with a red circle with a white
exclamation point in the center.
Answer
|
||||
|
·
Question 8
4 out of 4 points
|
Answer
|
|||||||||||||||||||||||||
|
·
Question 9
4 out of 4 points
|
What
is the process called that grants or denies a user’s access to network
resources?
Answer
|
||||
|
·
Question 10
4 out of 4 points
|
When
using BitLocker to encrypt your entire disk, which mode must you use if your
system is not configured for TPM support?
Answer
|
||||
|
·
Question 11
4 out of 4 points
|
Which
of the following is not a feature that you should consider when choosing a
new switch for a small business?
Answer
|
||||
|
·
Question 12
4 out of 4 points
|
A
Trojan is a self-replicating program that masks itself as a useful program
but is actually a type of malware.
Answer
|
||||
|
·
Question 13
4 out of 4 points
|
The
creator of a HomeGroup has the ability to change the randomly generated
password to a more user-friendly password.
Answer
|
||||
|
·
Question 14
0 out of 4 points
|
What
tool would you use to view error messages that are generated by system
services or applications?
Answer
|
||||
|
·
Question 15
4 out of 4 points
|
Which
of the following is a scanner used as a tool to determine what possible
points of entry exist that are open and vulnerable on your system?
Answer
|
||||
|
·
Question 16
4 out of 4 points
|
A
disk must be formatted as what type of disk if you want to access additional
features such as disk spanning?
Answer
|
||||
|
·
Question 17
4 out of 4 points
|
In
a file system that uses FAT or FAT32, the only file security option that is
available is the sharing permissions.
Answer
|
||||
|
·
Question 18
4 out of 4 points
|
How
many disks are needed to implement a RAID 1 + 0?
Answer
|
||||
|
·
Question 19
4 out of 4 points
|
In
regards to a user account, what does a white circle with a black arrow
indicate?
Answer
|
||||
|
·
Question 20
4 out of 4 points
|
The
802.11i standard is the newest version of wireless security that uses more
advanced encryption methods than the previous versions. What is it more
commonly referred to as?
Answer
|
||||
|
·
Question 21
4 out of 4 points
|
Which
one of the following is NOT a typical SONET data rate?
Answer
|
||||
|
·
Question 22
4 out of 4 points
|
A
user logs on to her account and is able to makes changes to her desktop, like
adding a background and screen saver. However, when she logs off and logs
back on, the desktop reverts to its original configuration. What type of user
profile does this user have?
Answer
|
||||
|
·
Question 23
0 out of 4 points
|
What
is RAID level 1 also called?
Answer
|
||||
|
·
Question 24
4 out of 4 points
|
What
is CRM software?
Answer
|
||||
|
·
Question 25
0 out of 4 points
|
Which
of the following groups are special identity groups? (Choose all that apply.)
Answer
|
||||
|
·
Question 26
4 out of 4 points
|
Which
of the following is a VPN mode that is usually implemented to give mobile
users access to the network?
Answer
|
||||
|
·
Question 27
0 out of 4 points
|
When
dealing with permissions in Linux, what are the three user types that can be
assigned permissions? (Choose three.)
Answer
|
||||
|
·
Question 28
4 out of 4 points
|
Traceroute
would be best suited for which of the following tasks?
Answer
|
||||
|
·
Question 29
4 out of 4 points
|
In
the problem-solving process, you should always devise a solution to the
problem you are facing prior to determining the scope of the problem.
Answer
|
||||
|
·
Question 30
4 out of 4 points
|
Which
edition of Windows Server 2008 includes support for up to 64 processors and
provides unlimited virtual instances?
Answer
|
||||
|
·
Question 31
4 out of 4 points
|
What
is a partial copy of a VM that is used to restore it to a previous state?
Answer
|
||||
|
·
Question 32
4 out of 4 points
|
You
have just connected a brand new workstation to your local network. As per
company policy, you have used a static IP configuration. However, all
attempts to reach the Internet from the workstation fail. You have verified
that you can communicate with servers and other workstations on the local
network, and that you are the only one having an issue reaching the Internet.
What is most likely the issue?
Answer
|
||||
|
·
Question 33
4 out of 4 points
|
What
kind of software would you use to view and troubleshoot protocol specific
problems such as TCP retries caused by missed acknowledgements, or duplicate
acknowledgements that cause network slow-down?
Answer
|
||||
|
·
Question 34
4 out of 4 points
|
What
does the ping message “Destination net unreachable” mean?
Answer
|
||||
|
·
Question 35
4 out of 4 points
|
The
plain old telephone service is a good example of what kind of WAN technology?
Answer
|
||||
|
·
Question 36
4 out of 4 points
|
In
Linux, what is the command for viewing a file’s contents onscreen?
Answer
|
||||
|
·
Question 37
4 out of 4 points
|
Most
small businesses require a high level of security including encryption
technologies and complex network connections.
Answer
|
||||
|
·
Question 38
0 out of 4 points
|
Firewall
rules can be based on which of the following properties? (Choose all that
apply.)
Answer
|
||||
|
·
Question 39
4 out of 4 points
|
Select
the true statement regarding analog and digital signals.
Answer
|
||||
|
·
Question 40
4 out of 4 points
|
Windows
can be installed on an extended partition that has been formatted with the
NTFS file system.
Answer
|
||||
|
·
Question 41
4 out of 4 points
|
Which
of the following is NOT a Linux file system?
Answer
|
||||
|
·
Question 42
0 out of 4 points
|
If
you want to implement fault-tolerance on your network, what type of RAID
would you use on the drives that contain data?
Answer
|
||||
|
·
Question 43
4 out of 4 points
|
You
don’t need to physically secure your servers as long as you use a good strong
password for your accounts.
Answer
|
||||
|
·
Question 44
4 out of 4 points
|
Your
local ISP has provided you with a dedicated line that has a Committed
Information Rate of 1.54 Mbps. What does this mean?
Answer
|
||||
|
·
Question 45
4 out of 4 points
|
The
ping command is used to determine the path between two devices.
Answer
|
||||
|
·
Question 46
4 out of 4 points
|
When
a disk is formatted, it is impossible to recover the data that was on the
disk..
Answer
|
||||
|
·
Question 47
4 out of 4 points
|
The
company you work for currently has ISDN service in place. Your supervisor
wishes to know what sort of ISDN service is being used so that better
alternatives can be considered. He tells you that the service has two
B-Channels and a D-Channel. What ISDN format do you have?
Answer
|
||||
|
·
Question 48
4 out of 4 points
|
Before
you purchase any software for a small business, especially the OS, you should
be aware of the number of users that are allowed to access the software. What
document will give you that information?
Answer
|
||||
|
·
Question 49
4 out of 4 points
|
You
recently completed a network overhaul over the weekend. Everything seems to
be functioning properly until you receive a swarm of help desk support
requests, all originating from one specific floor in your building. After a
few minutes on the phone with those affected, you determine that no one has
indicator lights active on their NICs. What is most likely the problem?
Answer
|
||||
|
·
Question 50
4 out of 4 points
|
Which
command will display the configured IP address, default gateway, and DNS
servers for a Windows workstation?
Answer
|
||||
|
·
Question 51
4 out of 4 points
|
You
have been asked to install a VPN remote access solution using Windows
Server.What do you need to install?
Answer
|
||||
|
·
Question 52
0 out of 4 points
|
You
are creating a new group for the Sales department. All of the users that will
be in this group will need to have access to the same resources. What scope
would you use for this group?
Answer
|
||||
|
·
Question 53
4 out of 4 points
|
The
ultimate goal of network security is to protect which of the following?
Answer
|
||||
|
·
Question 54
4 out of 4 points
|
A
router is considered to be a CSU/DSU.
Answer
|
||||
|
·
Question 55
4 out of 4 points
|
Which
of the following protocols is NOT used for Windows 7 VPN connections?
Answer
|
||||
|
·
Question 56
4 out of 4 points
|
What
is the native file-sharing protocol in Linux?
Answer
|
||||
|
·
Question 57
4 out of 4 points
|
Virtualization
is designed for testing and development purposes only.
Answer
|
||||
|
·
Question 58
4 out of 4 points
|
You’re
the network administrator for a large bean-bag chair company. You are
presenting to your supervisor several reasons to make use of cloud computing
for handling data processing. Which answer would be a valid benefit of using
cloud computing?
Answer
|
||||
|
·
Question 59
4 out of 4 points
|
What
does the ping message “Destination host unreachable” message mean?
Answer
|
||||
|
·
Question 60
4 out of 4 points
|
Which
statement about Multiprotocol Label Switching (MPLS) is true?
Answer
|
||||
|
·
Question 61
0 out of 4 points
|
Which
of the following are potential sources of interference in a wireless network?
(Choose all that apply.)
Answer
|
||||
|
·
Question 62
4 out of 4 points
|
When
a file is encrypted, what color does the file name appear in Windows
Explorer?
Answer
|
||||
|
·
Question 63
4 out of 4 points
|
If
you need to limit the amount of data users can store on a volume, you would
implement which of the following?
Answer
|
||||
|
·
Question 64
4 out of 4 points
|
Part
of SONET’s flexibility comes from its ability to be arranged in several
different physical topologies. Which of the following is NOT a possible SONET
topology?
Answer
|
||||
|
·
Question 65
4 out of 4 points
|
You
receive a phone call from a co-worker telling you that “the network is down.”
Just as you are about to look into the issue, you receive several more phone
calls from other co-workers. Using the problem-solving process, what must be
done first to effectively troubleshoot the issue?
Answer
|
||||
|
·
Question 66
0 out of 4 points
|
Which
of the following are standard NTFS permissions?
Answer
|
||||
|
·
Question 67
4 out of 4 points
|
Which
of the following is not a requirement for most small business networks?
Answer
|
||||
|
·
Question 68
4 out of 4 points
|
If
a problem occurs after a successful login, Last Known Good Configuration will
fix the issue.
Answer
|
||||
|
·
Question 69
4 out of 4 points
|
What
method does the CPU use to divide its computing cycles between more than one
process?
Answer
|
||||
|
·
Question 70
4 out of 4 points
|
For
a computer to connect to a HomeGroup, it must have certain features enabled
or configured correctly. Which of the following is not necessary to join a
HomeGroup?
Answer
|
||||
|
·
Question 71
4 out of 4 points
|
Select
the utility inside of Windows that allows the user to recover a previous
system state. This utility monitors drives and partitions, as well as
registry settings and system files.
Answer
|
||||
|
·
Question 72
4 out of 4 points
|
A
protocol analyzer, such as Wireshark, gives the ability to listen in on
network traffic as it moves through the Application layer to the Data Link
layer and vice versa..
Answer
|
||||
|
·
Question 73
0 out of 4 points
|
Which
of the following are case sensitive? (Choose all that apply.)
Answer
|
||||
|
·
Question 74
4 out of 4 points
|
Which
of the following should not be a concern when discerning the level of
security that is required in a network?
Answer
|
||||
|
·
Question 75
0 out of 4 points
|
Which
of the following can be used to secure data on disk drives? (Choose all that
apply.)
Answer
|
||||
|