Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- A logical network design focuses on specific technologies and products needed to create a network.
- Question 1 answers
- True
- False
- Question 2 text Question 2 3.4 points Save
- The distribution layer is the part of the network that connects the access layer to the rest of the network.
- Question 2 answers
- True
- False
- Question 3 text Question 3 3.4 points Save
- For what purpose is an SNMP trap command used?
- Question 3 answers
- to detect unauthorized agents
- to remotely disable a managed device
- to set device configuration parameters
- to have a device send a notification in case of a failure
- Question 4 text Question 4 3.4 points Save
- RAID 5 is an example of which of the following?
- Question 4 answers
- an automatic failover remote system
- a fault-tolerant disk subsystem
- a network monitoring device
- a software distribution method
- Question 5 text Question 5 3.4 points Save
- Which type of backup is used to back up changed data only, with the archive bit being reset during the backup?
- Question 5 answers
- Daily
- Normal
- Incremental
- Differential
- Question 6 text Question 6 3.4 points Save
- Which of the following could you use to capture network traffic for later analysis?
- Question 6 answers
- An SNMP management console
- A network sniffer
- Windows System Monitor
- A remote control utility
- Question 7 text Question 7 3.4 points Save
- A high percentage of frames detected with garbled data and other errors is usually an indication of what?
- Question 7 answers
- An active Ethernet network
- An inefficient network protocol
- A failing network adapter
- Unauthorized network access
- Question 8 text Question 8 3.4 points Save
- Which of the following is used to back up all data, whether or not the files have changed since the last backup?
- Question 8 answers
- Normal backup
- Differential backup
- Daily backup
- Incremental backup
- Question 9 text Question 9 3.4 points Save
- How many hard disks are required for RAID 1?
- Question 9 answers
- 1
- 2
- 3
- 4
- Question 10 text Question 10 3.4 points Save
- How many hard disks are required for RAID 5?
- Question 10 answers
- At least one
- At least two
- At least three
- At least four
- Question 11 text Question 11 3.4 points Save
- RAID 5 is also known as which of the following?
- Question 11 answers
- Disk mirroring
- Disk striping with parity
- Disk swapping
- Disk queuing
- Question 12 text Question 12 3.4 points Save
- You can define an alert to cause a computer to take which of the following actions?
- Question 12 answers
- Send a network message to a specific computer
- Log an entry in the application event log
- Start a performance log that you've already defined
- All of the above
- Question 13 text Question 13 3.4 points Save
- What is the role of core layer network technology?
- Question 13 answers
- It provides the wide area links connecting distribution layer networks
- It acts as the backbone in a routed LAN
- It is a technology that directly provides users with access to LAN resources
- It is the software and services that operate on servers running the NOS
- Question 14 text Question 14 3.4 points Save
- When connecting to your local ISP, you connect through which of the following?
- Question 14 answers
- MAE
- NAP
- POP
- NSF
- Question 15 text Question 15 3.4 points Save
- Which server type would you most likely need to deploy at each physical location in a WAN?
- Question 15 answers
- Logon and authentication server
- Mail service server
- Web server
- Mainframe gateway server
- Question 16 text Question 16 3.4 points Save
- Which of the following does TCP use to find a computer's MAC address when its IP address is known?
- Question 16 answers
- IP
- ARP
- RARP
- DHCP
- Question 17 text Question 17 3.4 points Save
- Which of the following would you find in a typical RFP?
- Question 17 answers
- Security and control requirements
- Bid evaluation criteria
- Reliability and performance guarantee requirements
- All of the above
- Question 18 text Question 18 3.4 points Save
- Which of the following is the maximum upstream rate for OC-1?
- Question 18 answers
- 1.6Mbps
- 2.3Mbps
- 13Mbps
- 16Mbps
- Question 19 text Question 19 3.4 points Save
- How many separate channels does ADSL create over one local loop circuit?
- Question 19 answers
- 1
- 2
- 3
- 4
- Question 20 text Question 20 3.4 points Save
- A Trojan horse is a program that appears to be one thing but is actually another.
- Question 20 answers
- True
- False
- Question 21 text Question 21 3.4 points Save
- Unauthorized access is most often the result of an incursion by an individual from outside an organization.
- Question 21 answers
- True
- False
- Question 22 text Question 22 3.4 points Save
- Which of the following is an example of a strong password?
- Question 22 answers
- Dictionary
- Bluegreen2
- cu&tin=bronze
- ahtraM
- Question 23 text Question 23 3.4 points Save
- Which of the following could be used to detect someone trying to guess a user's password?
- Question 23 answers
- Account lockout
- Password history
- Password age
- Reversible password encryption
- Question 24 text Question 24 3.4 points Save
- Which of the following refers to a network segment isolated for security reasons?
- Question 24 answers
- WPA
- DES
- TKIP
- DMZ
- Question 25 text Question 25 3.4 points Save
- Which of the following is a malicious application designed to monitor and record a user's activity on a computer?
- Question 25 answers
- Spyware
- Rootkit
- Worm
- Signature
- Question 26 text Question 26 3.4 points Save
- Ping of death is an example of which of the following?
- Question 26 answers
- Malware
- WinNuke attack
- DoS attack
- SYN flood
- Question 27 text Question 27 3.4 points Save
- Which of the following might an attacker employ to make a DDoS attack difficult to detect or block?
- Question 27 answers
- IP spoofing
- Dynamic filtering
- WinNuke
- A DES algorithm
- Question 28 text Question 28 3.4 points Save
- You want to limit traffic into and out of your network to ports 80 and 443. What type of device should you deploy?
- Question 28 answers
- Firewall
- NAT server
- Switch
- Bridge
- Question 29 text Question 29 3.4 points Save
- Which of the following events affects the highest percentage of organizations each year?
- Question 29 answers
- Device failure
- Virus
- Theft of equipment
- Fraud
- Question 30 text Question 30 3.4 points Save
- What is circuit loading?
- Question 30 answers
- The process of testing a circuit to determine its maximum capacity
- The process of estimating network circuit requirements
- A reference to the amount of data carried on a circuit
- A reference to buying and installing more capacity than it actually needed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement