Alexa_Week32

¡Supera tus tareas y exámenes ahora con Quizwiz!

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? A) Port scanner B) Packet sniffer C) IPS D) IDS E) System logs

A) Port scanner

Which of the following tools can you use to troubleshoot and validate Windows updates? (Select three.) A) PowerShell B) Windows Server Update Service (WSUS) C) Windows Defender D) Windows Transfer Service E) Device Manager F) Windows Server Troubleshooter G) Windows Update Troubleshooter

A) PowerShell B) Windows Server Update Service (WSUS) G) Windows Update Troubleshooter

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy? A) Test the solution. B) Establish what has changed. C) Document the solution. D) Recognize the potential side effects of the solution.

A) Test the solution.

While deploying Windows updates, when would you use the critical update ring? A) When deploying updates to important systems (only after the update has been vetted). B) When deploying updates to users that want to stay on top of changes. C) When deploying updates to most of the organization in order to monitor for feedback. D) When deploying updates for any general user within the organization.

A) When deploying updates to important systems (only after the update has been vetted).

Which of the following are true about Windows Update for Business? (Select three.) A) Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. B) Windows Update for Business provides the latest features for your Windows 10 devices, but it does not include security upgrades. C) Windows Update for Business works with all versions of Windows 10. D) Windows Update for Business is a Group Policy management tool. E) Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. F) Windows Update for Business can only be configured with Group Policy. G) Windows Update for Business works with all versions of Windows 10 except Windows 10 Home.

A) Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. E) Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. G) Windows Update for Business works with all versions of Windows 10 except Windows 10 Home.

An employee named Bob Smith, whose username is bsmith, has left the company. You have been instructed to delete his user account and home directory. Which of the following commands would produce the desired outcome? (Select two.) A) userdel bsmith;rm -rf /home/bsmith B) userdel -r bsmith C) userdel -x bsmith D) userdel bsmith E) userdel -h bsmith

A) userdel bsmith;rm -rf /home/bsmith B) userdel -r bsmith

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal? A) Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection. B) Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. C) Implement a host-based firewall on each Windows 2000 workstation, and configure them to automatically download and install updates. D) Install antivirus software on the Windows 2000 workstations, and configure them to automatically download and install updates.

B) Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this? A) Proxy server B) Content switch C) Circuit-level gateway D) Bandwidth shaper

B) Content switch

Upon running a security audit in your organization, you discover that several sales employees are using the same domain user account to log in and update the company's customer database. Which action should you take? (Select two. Each response is part of a complete solution.) A) Implement a Group Policy Object (GPO) that restricts simultaneous logins to one. B) Delete the account that the sales employees are currently using. C) Train sales employees to use their own user accounts to update the customer database. D) Implement a Group Policy Object (GPO) that implements time-of-day login restrictions. E) Apply the Group Policy Object (GPO) to the container where the sales employees' user accounts reside.

B) Delete the account that the sales employees are currently using. C) Train sales employees to use their own user accounts to update the customer database.

When deploying Windows updates, when would you use the preview update ring? A) When deploying updates for any general user within the organization. B) When deploying updates to users that want to stay on top of changes. C) When deploying updates to important machines (only after the update has been vetted). D) When deploying updates to most of the organization in order to monitor for feedback.

B) When deploying updates to users that want to stay on top of changes.

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently? A) SSH B) arp C) arping D) netstat

B) arp

You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server? A) dig B) ifconfig C) Telnet D) ipconfig

B) ifconfig

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy? A) Establish what has changed. B) Identify the affected area. C) Recognize the potential side effects of the problem. D) Establish the symptoms.

D) Establish the symptoms.

Which Class of Service (CoS) priority value should be assigned to a video conference call? A) 1 B) 0 C) 6 D) 4 E) 7 F) 5 G) 3 H) 2

D) 4

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? A) Unmanaged switch B) Layer 2 switch C) Multilayer switch D) Layer 1 switch

C) Multilayer switch

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement? A) Traffic shaping B) QoS C) Spanning Tree D) Ethernet bonding

D) Ethernet bonding

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.) A) Account lockout threshold B) Password must meet complexity requirements C) Enforce password history D) Maximum password age E) Minimum password length F) Account lockout duration

A) Account lockout threshold E) Minimum password length

For users on your network, you want to automatically lock user accounts if four incorrect passwords are used within 10 minutes. What should you do? A) Configure account lockout policies in Group Policy B) Configure account expiration in user accounts C) Configure the enable/disable feature in user accounts D) Configure day/time restrictions in user accounts E) Configure password policies in Group Policy

A) Configure account lockout policies in Group Policy

A user reports that she can't connect to the internet. After some investigation, you find that the wireless router has been misconfigured. You're responsible for managing and maintaining the wireless access point. What should you do next? A) Create an action plan. B) Fix the problem. C) Determine if escalation is needed. D) Document the problem.

A) Create an action plan.

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer? A) Run the netsh winhttp import proxy source command. B) Check the Local Security Policy. C) Go to Programs and Features in Control Panel. D) Run the wuauclt.exe /listupdates command.

C) Go to Programs and Features in Control Panel.

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task? A) Port security B) Virtual private network (VPN) C) Network segmentation D) Data encryption using PKI

C) Network segmentation

Which TCP/IP utility gives the following output? A) ipconfig B) arp -a C) ping D) ifconfig

C) ping

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the name of the company requesting payment? A) Home Shop B) Big 7, Inc C) Wood Specialist D) ACME, Inc

D) ACME, Inc

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? A) Ethernet bonding B) A traffic shaper C) A caching engine D) An application-specific integrated circuit

D) An application-specific integrated circuit

Which TCP/IP utility gives you the following output? A) netstat -a B) arp -a C) ping D) ipconfig

D) ipconfig

When troubleshooting network issues, it's important to carry out tasks in a specific order. Drag each trouble shooting task on the left to the correct step on the right. A) Establish a plan B) Implement C) Test D) Establish a theory E) Identify F) Document G) Verify Drop Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

E) Identify D) Establish a theory C) Test A) Establish a plan B) Implement G) Verify F) Document

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next? A) Determine if escalation is needed. B) Document the problem. C) Create an action plan. D) Fix the problem.

A) Determine if escalation is needed.

Match the Class of Service (CoS) priority on the left with its corresponding value on the right. A) Video B) Network C) Critical D) Excellent E) Best F) Internetwork G) Voice H) Background Drop 0 1 2 3 4 5 6 7

0 - Background 1 - Best effort 2 - Excellent effort 3 - Critical applications 4 - Video (< 100ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network contro

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next? A) Identify the affected areas of the network. B) Establish the most probable cause. C) Determine if anything has changed. D) Determine if escalation is necessary.

A) Identify the affected areas of the network.

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command can you use to disable this account? A) usermod -u joer B) usermod -l joer C) usermod -d joer D) usermod -L joer

D) usermod -L joer

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do? A) Create a granular password policy for Matt. Apply the new policy directly to Matt's user account. B) Create a granular password policy for Matt. Create a new group, make Matt a member of that group, and then apply the new policy directly to the new group. Make sure the new policy has a higher precedence value than the value for the existing policy. C) Edit the existing password policy. Define exceptions for the required settings. Apply the exceptions to Matt's user account. D) Create a granular password policy for Matt. Apply the new policy directly to Matt's user account. Remove Matt from the DirectorsGG group.

A) Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next? A) Identify possible side effects of the solution. B) Identify the affected areas. C) Document the problem and the solution. D) Apply the patch to the router.

A) Identify possible side effects of the solution.

You have a Windows 10 system. You have used the Settings app to access Windows Update. From this location, how long can you pause updates? A) 14 days B) 7 days C) 365 days D) 30 days

B) 7 days

What is WindowsUpdate.log? A) A log file that analyzes Windows Update Service, BITS, and Windows Network Diagnostics Service. B) A log file you can create and save in order to locate errors or problems. C) A log file that deploys updates to device groups over a deployment timeline. D) A log file that allows you to see enforced policies on your Windows 10 machine.

B) A log file you can create and save in order to locate errors or problems.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next? A) Create an action plan. B) Identify the results and side effects of the solution. C) Determine if escalation is necessary. D) Document the problem and solution.

B) Identify the results and side effects of the solution.

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You need to make the change as easily as possible. Which of the following actions should you take? A) Create a new domain. Then move the contents of the Directors OU to the new domain and configure the necessary password policy on that domain. B) Implement a granular password policy for the users in the Directors OU. C) Create a GPO linked to the Directors OU. Configure the password policy in the new GPO. D) Go to Active Directory Users and Computers. Select all user accounts in the Directors OU and then edit the user account properties to require longer password.

B) Implement a granular password policy for the users in the Directors OU.

What is the purpose of using Ethernet bonding? (Select two.) A) Provides increased bus speeds. B) Increases network performance. C) Increases read and write operations between the system bus and network adapters. D) Provides a failover solution for network adapters. E) Enables Dual Remote Access (DRA) over a WAN link.

B) Increases network performance. D) Provides a failover solution for network adapters.

Which of the following statements about DSCP are true? (Select two.) A) It uses a priority value between 0 and 7. B) It uses the DiffServ field to add precedence values. C) Classification occurs at Layer 2. D) Classification occurs at Layer 3. E) The network switch assigns priority values.

B) It uses the DiffServ field to add precedence values. D) Classification occurs at Layer 3.

With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 filter? A) Only packets with 192.168.0.34 in the destination address are captured. B) Only packets with 192.168.0.34 in either the source or destination address are captured. C) Only packets with 192.168.0.34 in the source address are captured. D) Only packets on the 192.168.0.34 network are captured.

B) Only packets with 192.168.0.34 in either the source or destination address are captured.

Windows Update for Business (WUfB) lets you keep your devices current with the latest security upgrades and features. Which operating system releases does WUfB support? A) Windows 8 Home B) Windows 10 C) Windows 10 Home D) Windows 8

B) Windows 10

A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ASCII output only. Which of the following tcpdump options will achieve this output? A) -SA port 443 B) -SXX port 443 C) -SX port 443 D) src port 443

C) -SX port 443

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next? A) Create an action plan. B) Establish the most probable cause. C) Determine what has changed. D) Identify the affected areas of the network.

C) Determine what has changed.

Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output? A) ifconfig B) dig C) netstat D) nslookup

C) netstat

While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network? A) ifconfig B) tracert C) traceroute D) nslookup

C) traceroute

Which of the following utilities could you use to lock a user account? (Select two.) A) ulimit B) useradd C) usermod D) userdel E) passwd

C) usermod E) passwd

A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown below. What should you do? (Choose two. Each response is a complete solution.) A) Replace the patch cables connecting the switches together with red crossover cables. B) Enable port security on each switch port. C) Connect the patch panel to the switches with red crossover cables. D) Enable STP on each switch. E) Remove the patch cable connecting the first switch to the third switch. F) Consolidate all patch cables from the patch panel to a single switch.

D) Enable STP on each switch. E) Remove the patch cable connecting the first switch to the third switch.

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do? A) Configure day/time settings in user accounts. B) Configure expiration settings in user accounts. C) Configure account lockout policies in Group Policy. D) Configure account policies in Group Policy.

D) Configure account policies in Group Policy.

What does the Windows Update Delivery Optimization function do? A) Delivery Optimization lets you know when and if there are any urgent updates for your system and provides you with an option to download and install them. B) Delivery Optimization lets you view the updates you have installed. It also lets you uninstall an update if needed. C) Delivery Optimization lets you set active hours to indicate normal use for your device. The device will not reboot to install updates during this time. D) Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

D) Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take? A) Review company websites to see which type of sensitive information is being shared. B) Limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials. C) Implement policies that restrict the sharing of sensitive company information on employees' personal social media pages. D) Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.

D) Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration? A) The password must be entered within 10 minutes of the login prompt being displayed. B) The previous 10 passwords cannot be reused. C) Users must change the password at least every 10 days. D) Users cannot change the password for 10 days. E) The password must contain 10 or more characters.

D) Users cannot change the password for 10 days.


Conjuntos de estudio relacionados

APUSH: The beginning through War of 1812

View Set

Romeo & Juliet (Acts 3, 4, & 5)- quiz fridat

View Set

SAT Writing and Language Test Strategies and Rules

View Set

Medical Terminology (Chapter 6) Assignment

View Set

Module 4 - Macro. Unemployment, Inflation...

View Set