This week only. Pastebin PRO Accounts Christmas Special! Don't miss out!Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Apr 30th, 2011  |  syntax: None  |  size: 7.01 KB  |  views: 192  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. A logical network design focuses on specific technologies and products needed to create a network.
  2. Question 1 answers
  3.         True
  4.         False
  5.  
  6. Question 2 text   Question 2    3.4 points      Save  
  7.        
  8. The distribution layer is the part of the network that connects the access layer to the rest of the network.
  9. Question 2 answers
  10.         True
  11.         False
  12.  
  13. Question 3 text   Question 3    3.4 points      Save  
  14.        
  15. For what purpose is an SNMP trap command used?
  16. Question 3 answers
  17.                 to detect unauthorized agents
  18.                 to remotely disable a managed device
  19.                 to set device configuration parameters
  20.                 to have a device send a notification in case of a failure
  21.  
  22. Question 4 text   Question 4    3.4 points      Save  
  23.        
  24. RAID 5 is an example of which of the following?
  25. Question 4 answers
  26.                 an automatic failover remote system
  27.                 a fault-tolerant disk subsystem
  28.                 a network monitoring device
  29.                 a software distribution method
  30.  
  31. Question 5 text   Question 5    3.4 points      Save  
  32.        
  33. Which type of backup is used to back up changed data only, with the archive bit being reset during the backup?
  34. Question 5 answers
  35.                 Daily
  36.                 Normal
  37.                 Incremental
  38.                 Differential
  39.  
  40. Question 6 text   Question 6    3.4 points      Save  
  41.        
  42. Which of the following could you use to capture network traffic for later analysis?
  43. Question 6 answers
  44.                 An SNMP management console
  45.                 A network sniffer
  46.                 Windows System Monitor
  47.                 A remote control utility
  48.  
  49. Question 7 text   Question 7    3.4 points      Save  
  50.        
  51. A high percentage of frames detected with garbled data and other errors is usually an indication of what?
  52. Question 7 answers
  53.                 An active Ethernet network
  54.                 An inefficient network protocol
  55.                 A failing network adapter
  56.                 Unauthorized network access
  57.  
  58. Question 8 text   Question 8    3.4 points      Save  
  59.        
  60. Which of the following is used to back up all data, whether or not the files have changed since the last backup?
  61. Question 8 answers
  62.                 Normal backup
  63.                 Differential backup
  64.                 Daily backup
  65.                 Incremental backup
  66.  
  67. Question 9 text   Question 9    3.4 points      Save  
  68.        
  69. How many hard disks are required for RAID 1?
  70. Question 9 answers
  71.                 1
  72.                 2
  73.                 3
  74.                 4
  75.  
  76. Question 10 text   Question 10  3.4 points      Save  
  77.        
  78. How many hard disks are required for RAID 5?
  79. Question 10 answers
  80.                 At least one
  81.                 At least two
  82.                 At least three
  83.                 At least four
  84.  
  85. Question 11 text   Question 11  3.4 points      Save  
  86.        
  87. RAID 5 is also known as which of the following?
  88. Question 11 answers
  89.                 Disk mirroring
  90.                 Disk striping with parity
  91.                 Disk swapping
  92.                 Disk queuing
  93.  
  94. Question 12 text   Question 12  3.4 points      Save  
  95.        
  96. You can define an alert to cause a computer to take which of the following actions?
  97. Question 12 answers
  98.                 Send a network message to a specific computer
  99.                 Log an entry in the application event log
  100.                 Start a performance log that you've already defined
  101.                 All of the above
  102.  
  103. Question 13 text   Question 13  3.4 points      Save  
  104.        
  105. What is the role of core layer network technology?
  106. Question 13 answers
  107.                 It provides the wide area links connecting distribution layer networks
  108.                 It acts as the backbone in a routed LAN
  109.                 It is a technology that directly provides users with access to LAN resources
  110.                 It is the software and services that operate on servers running the NOS
  111.  
  112. Question 14 text   Question 14  3.4 points      Save  
  113.        
  114. When connecting to your local ISP, you connect through which of the following?
  115. Question 14 answers
  116.                 MAE
  117.                 NAP
  118.                 POP
  119.                 NSF
  120.  
  121. Question 15 text   Question 15  3.4 points      Save  
  122.        
  123. Which server type would you most likely need to deploy at each physical location in a WAN?
  124. Question 15 answers
  125.                 Logon and authentication server
  126.                 Mail service server
  127.                 Web server
  128.                 Mainframe gateway server
  129.  
  130. Question 16 text   Question 16  3.4 points      Save  
  131.        
  132. Which of the following does TCP use to find a computer's MAC address when its IP address is known?
  133. Question 16 answers
  134.                 IP
  135.                 ARP
  136.                 RARP
  137.                 DHCP
  138.  
  139. Question 17 text   Question 17  3.4 points      Save  
  140.        
  141. Which of the following would you find in a typical RFP?
  142. Question 17 answers
  143.                 Security and control requirements
  144.                 Bid evaluation criteria
  145.                 Reliability and performance guarantee requirements
  146.                 All of the above
  147.  
  148. Question 18 text   Question 18  3.4 points      Save  
  149.        
  150. Which of the following is the maximum upstream rate for OC-1?
  151. Question 18 answers
  152.                 1.6Mbps
  153.                 2.3Mbps
  154.                 13Mbps
  155.                 16Mbps
  156.  
  157. Question 19 text   Question 19  3.4 points      Save  
  158.        
  159. How many separate channels does ADSL create over one local loop circuit?
  160. Question 19 answers
  161.                 1
  162.                 2
  163.                 3
  164.                 4
  165.  
  166. Question 20 text   Question 20  3.4 points      Save  
  167.        
  168. A Trojan horse is a program that appears to be one thing but is actually another.
  169. Question 20 answers
  170.         True
  171.         False
  172.  
  173. Question 21 text   Question 21  3.4 points      Save  
  174.        
  175. Unauthorized access is most often the result of an incursion by an individual from outside an organization.
  176. Question 21 answers
  177.         True
  178.         False
  179.  
  180. Question 22 text   Question 22  3.4 points      Save  
  181.        
  182. Which of the following is an example of a strong password?
  183. Question 22 answers
  184.                 Dictionary
  185.                 Bluegreen2
  186.                 cu&tin=bronze
  187.                 ahtraM
  188.  
  189. Question 23 text   Question 23  3.4 points      Save  
  190.        
  191. Which of the following could be used to detect someone trying to guess a user's password?
  192. Question 23 answers
  193.                 Account lockout
  194.                 Password history
  195.                 Password age
  196.                 Reversible password encryption
  197.  
  198. Question 24 text   Question 24  3.4 points      Save  
  199.        
  200. Which of the following refers to a network segment isolated for security reasons?
  201. Question 24 answers
  202.                 WPA
  203.                 DES
  204.                 TKIP
  205.                 DMZ
  206.  
  207. Question 25 text   Question 25  3.4 points      Save  
  208.        
  209. Which of the following is a malicious application designed to monitor and record a user's activity on a computer?
  210. Question 25 answers
  211.                 Spyware
  212.                 Rootkit
  213.                 Worm
  214.                 Signature
  215.  
  216. Question 26 text   Question 26  3.4 points      Save  
  217.        
  218. Ping of death is an example of which of the following?
  219. Question 26 answers
  220.                 Malware
  221.                 WinNuke attack
  222.                 DoS attack
  223.                 SYN flood
  224.  
  225. Question 27 text   Question 27  3.4 points      Save  
  226.        
  227. Which of the following might an attacker employ to make a DDoS attack difficult to detect or block?
  228. Question 27 answers
  229.                 IP spoofing
  230.                 Dynamic filtering
  231.                 WinNuke
  232.                 A DES algorithm
  233.  
  234. Question 28 text   Question 28  3.4 points      Save  
  235.        
  236. You want to limit traffic into and out of your network to ports 80 and 443. What type of device should you deploy?
  237. Question 28 answers
  238.                 Firewall
  239.                 NAT server
  240.                 Switch
  241.                 Bridge
  242.  
  243. Question 29 text   Question 29  3.4 points      Save  
  244.        
  245. Which of the following events affects the highest percentage of organizations each year?
  246. Question 29 answers
  247.                 Device failure
  248.                 Virus
  249.                 Theft of equipment
  250.                 Fraud
  251.  
  252. Question 30 text   Question 30  3.4 points      Save  
  253.        
  254. What is circuit loading?
  255. Question 30 answers
  256.                 The process of testing a circuit to determine its maximum capacity
  257.                 The process of estimating network circuit requirements
  258.                 A reference to the amount of data carried on a circuit
  259.                 A reference to buying and installing more capacity than it actually needed
clone this paste RAW Paste Data