Saturday 21 April 2018

Which of the following are vulnerabilities of a poorly managed network? (Select all that apply.)

1. (p. 505) Which of the following are vulnerabilities of a poorly managed network? (Select all that apply.)
A. lack of security
B. unnecessary cost
C. unnecessary redundancy
D. lack of efficiency
E. A, B, C, and D

2. (p. 505) What is the overall term for the set of documents, policies, and procedures for maintaining and updating a network with the objective of lessening vulnerabilities?
A. configuration management
B. physical network diagram
C. wiring diagram
D. logical network diagram

3. (p. 506) Which of the following identifies how wires in a network connect to various switches and other devices?
A. configuration management
B. physical network diagram
C. network diagram
D. wiring scheme

4. (p. 506) Which of the following documents the cabling runs of a network, defining the type of connections, such as Gigabit Ethernet, T1, and so on?
A. configuration management
B. network diagram
C. wiring scheme
D. network map

5. (p. 506) Which of the following includes every router, switch, server, CSU/DSU, cable modem, and wireless access point, including the make and model and firmware upgrade?
A. configuration management
B. network diagram
C. wiring scheme
D. network map

6. (p. 506) Whose job is it to create a network diagram?
A. human resources
B. network administrator
C. network technician
D. desktop support technician

7. (p. 508) This document describes the broadcast domains and individual IP addresses for all devices in a network with static IP addresses, sometimes showing individual computers, but rarely showing connections to individual computers.
A. configuration management
B. network diagram
C. wiring scheme
D. network map

8. (p. 506) Which of the following includes diagrams of individual structured cabling connections, including the actual designation for each cable run, such as the wiring details for an EIA/TIA 568B connection?
A. configuration management
B. network diagram
C. wiring scheme
D. network map

9. (p. 506) Which of the following would be included in a network diagram? (Select all that apply.)
A. gateway router
B. IP addresses
C. VLAN switches
D. EIA/TIA details
E. A, B, and C

10. (p. 510) Which of the following is a term that describes a log of performance and other indicators taken of a network and its server during normal operations?
A. application log
B. system log
C. security log
D. baseline

11. (p. 510) Which of the following are policies that affect most users? (Select all that apply.)
A. acceptable use
B. configuration
C. security
D. upgrade
E. both A and C

12. (p. 510) How to deal with a virus attack would be detailed under which of the following?
A. acceptable user policy
B. security policy
C. configuration policy
D. baseline

13. (p. 510) Which of the following describes exactly what a user can and cannot do with the organization's computers and network?
A. acceptable use policy
B. security policy
C. configuration policy
D. baseline

14. (p. 511) Almost every Cisco device has a command a network tech can use to document that configuration of that document. What is that command?
A. Performance Monitor
B. show startup-config
C. netstat
D. msconfig

15. (p. 512) This Windows utility will allow you to gather information on many aspects of a computer and network, which you can save in log files to serve as a baseline.
A. Performance Monitor
B. show config
C. netstat
D. msconfig

16. (p. 514) Which of the following is a way of presenting information in Performance Monitor?
A. object
B. view
C. counter
D. log

17. (p. 512) Which of the following is a measurable feature of a system component in Windows Performance Monitor?
A. object
B. view
C. counter
D. log

18. (p. 512) Which of the following is a system component that can be measured in Windows Performance Monitor?
A. object
B. view
C. counter
D. log

19. (p. 514) Use this capability of Performance Monitor to save data collected on system and network performance.
A. object
B. view
C. counter
D. log

20. (p. 518) This log records events such as logon successes and failures.
A. system
B. security
C. application
D. network

21. (p. 518) This log records events related to services, device drivers, and configuration changes.
A. system
B. security
C. application
D. network

22. (p. 518) This log records events related to a program, including starts, stops, and failures.
A. system
B. security
C. application
D. network

23. (p. 518) What is the name of the Windows utility for viewing log files?
A. Performance Monitor
B. System Tools
C. show config
D. Event Viewer

24. (p. 522-523) This term applies to the result of techniques that make sure a shared resource is available in a timely manner when clients request.
A. caching
B. resource availability
C. high availability
D. data backup

25. (p. 520) This term applies to the process of storing data that someone asks for in the hope that someone else will ask for it again.
A. caching
B. resource availability
C. high availability
D. data backup

26. (p. 523) In spite of all attempts to protect networks, systems do fail, and when you rebuild a new system, you must have a recent one of these in order to get back up and running.
A. caching
B. resource availability
C. high availability
D. data backup

27. (p. 523) Data backup, UPSes, backup generators, and redundant hardware all provide some form of this.
A. fault tolerance
B. QoS
C. traffic shaping
D. caching

28. (p. 523) This form of redundancy uses multiple hard drives working together in such a way that if one drive fails, the others will continue without interruption.
A. RAID 1
B. UPS
C. data backup
D. RAID 0

29. (p. 526) This keeps your servers running for a short period of time after an electrical brownout or blackout.
A. UPS
B. backup generator
C. RAID
D. redundant hardware

30. (p. 527) This term describes multiple servers or groups of servers representing a single server, distributing the load and protecting from the failure of a single server.
A. RAID
B. UPS
C. cluster
D. QoS

31. (p. 518) Which of the following is not a category of logs?
A. general
B. history
C. system
D. traffic

32. (p. 527) Which of the following RAID levels has no fault tolerance?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6

33. (p. 518) Which of the following is a Unix/Linux logging program?
A. Event Viewer
B. PerfMon
C. Syslog
D. Console

34. (p. 508) This type of configuration document goes deeper into the individual components of the network:
A. network map
B. wiring scheme
C. network diagram
D. baseline


35. (p. 506) Which of the following terms describes cabling and connectors in network wiring standards used (CAT53, 568A, fiber, and so on)?
A. network map
B. baseline
C. network diagram
D. wiring scheme

No comments:

Post a Comment