NOS 120 final all sets

¡Supera tus tareas y exámenes ahora con Quizwiz!

Modify the rain.c program you created in this chapter so that the total of all inches of rain when added together is 136 inches.

#include <stdio.h> int main() { int rain, total_rain = 0; for (rain = 0; rain < 17; rain++) { printf("We have had %d inches of rain.\n", rain); total_rain = total_rain + rain; } printf("We have had a total "); printf("of %d inches of rain.\n", total_rain); }

Write a C program called fedora.c that displays the line "Fedora is a version of Linux."

#include <stdio.h> int main() { printf("Fedora is a version of Linux.\n"); }

Write a program in which you enter a number and the program calculates and displays that number cubed.

#include <stdio.h> int main(void) { int num, cube; printf("\nEnter the number to cube: "); scanf("%d", &num); cube = num*num*num; printf("Your number cubed is: %d\n", cube); }

Write a Perl script to display the line "Perl was developed by Larry Wall".

#!/usr/bin/perl # Program name: exercise1.pl print ("Perl was developed by Larry Wall\n");

Write a Perl program that contains a hash variable and displays the keys. The hash variable contains the following key and value combinations: Key Value 1 Martin 2 Hanson 3 Stephens 4 Rawlins

#!/usr/bin/perl # Program name: exercise10.pl %peoplelist = ('Martin', 1, 'Hanson', 2, 'Stephens', 3, 'Rawlins', 4); print ("The keys are:\n"); print ("$peoplelist{'Martin'}\n"); print ("$peoplelist{'Hanson'}\n"); print ("$peoplelist{'Stephens'}\n"); print ("$peoplelist{'Rawlins'}\n");

Write a Perl script in which you create a variable in the script to contain the name Beth and then have the script display "Welcome Beth."

#!/usr/bin/perl # Program name: exercise2.pl $name = "Beth"; print ("Welcome $name\n");

Modify the script you wrote in Exercise 2 so that you prompt for the name and then display "Welcome name".

#!/usr/bin/perl # Program name: exercise3.pl print ("Enter your first name: "); $name = <STDIN>; print ("Welcome $name\n");

Create a Perl program that uses an array of vegetables—peas, carrots, spinach, corn, beans—and in which all of the vegetables in the array are displayed to the screen.

#!/usr/bin/perl # Program name: exercise5.pl @vegetables = ("peas", "carrots", "spinach", "corn", "beans"); print ("The vegetables on my list are:\n"); print ("$vegetables[0]\n"); print ("$vegetables[1]\n"); print ("$vegetables[2]\n"); print ("$vegetables[3]\n"); print ("$vegetables[4]\n");

Write a Perl program that attempts to open a file that does not exist, and that prints the message "That file is nonexistent.".

#!/usr/bin/perl # Program name: exercise7.pl open (FILEIN, "nofile") || warn "Could not open students file\n";

Write a Perl program that converts a value in inches to a value in centimeters and displays the result. (1 inch = 2.54 centimeters.).

#!/usr/bin/perl # Program name: exercise8.pl print ("Enter a number of inches: "); $inches = <STDIN>; $cent = $inches * 2.54; print ("That is $cent centimeters\n");

Concerning DNS domain hierarchy, what are examples of global top-level domains?

.com, .net, .org

Which of the following is the range of well-known Transport layer ports?

0-1023

After creating a VM, how many virtual adapters are included by default?

1

Certain IPv6 addresses can be contracted. Which of the following answers is the contracted form of 21cd:0053:0000:0000/64?

21cd:53::/64

Before a DHCP server can hand out addresses, which of the following steps must be completed? (Choose two answers.)

A DHCP scope must be created and activated. The DHCP server must be created and authorized.

How many MAC addresses are available for virtual network adapters, created by Hyper-V?

256

How many octets is the network portion of a Class C address?

3

Design a Perl program that sorts the last names Martin, Adams, Sandoval, Perry, Yablonsky, Brown, and Ramirez..

#!/usr/bin/perl #Program name: exercise6.pl @namelist = (Martin, Adams, Sandoval, Perry, Yablonsky, Brown, Ramirez); @sortednames = sort @namelist; print "@sortednames"; print"\n";

Create a C++ program that tests to see if the file accounts exists and prints a message to say whether the file exists.

#include <iostream> #include <fstream> using namespace std; int main(void) { ifstream file("accounts"); if (file.fail()) cout << "Can't find the accounts file.\n"; else { cout << "The accounts file exits.\n"; } }

Write a small C++ program that writes to the screen the make and model of the car or bicycle you own (or one that you wish to own)

#include <iostream> using namespace std; int main(void) { cout << "I own a Trek mountain bike.\n"; cout << "It was made in 2004.\n"; }

Create a program that enables you to input a positive integer and that will then tell you if it is a prime number or if it can be divided by 2.

#include <stdio.h> int main (void) { int num; int count; int signal; printf("Enter the number to test: "); scanf("%d", &num); for (count=2, signal=1; (count<=(num/2)) && signal; ) { if ((num % count) ==0) signal = 0; else count++; } if (signal) printf("%d is prime\n", num); else printf("%d has %d as a factor\n", num, count); }

Write a program in which a prompt asks for your first name and after you enter your first name the program displays it.

#include <stdio.h> int main() { char string[20]; printf("\nEnter your first name: "); scanf("%s", string); printf("Your first name is: %s\n", string); }

Create a shell variable that outputs the calendar for the current month.

CALNOW=`cal` CALNOW $CALNOW

What technology can be used to allow high-bandwidth Ethernet to be used in a WAN connection?

CET

What is a subnetting method that enables you to place the division between the network bits and the host bits anywhere in the address, not just between octets?

CIDR

What method is used by 802.11 devices to access a shared medium?

CSMA/CA

Which of the following access methods may use RTS/CTS signaling?

CSMA/CA is used by Wi-Fi devices which can include RTS/CTS.

The command-line utility can create new user accounts by importing information from a comma-separated value file?

CSVDE.exe

While interviewing a user that has reported trouble accessing a server, you determine that other users on the LAN have no problem accessing the server. What question should you ask next?

Can you access other devices on the network? If the user can access other devices, then you can narrow down the problem to that user's inability to access the particular server rather than a more general network problem.

An employee was suspected of storing illicit material on his hard drive. The hard drive was removed and placed in an anti-static bag and secured in a locker until authorities could examine it. The procedure and participants of the removal and storage of the drive were all documented. This is an example of which step in the incident handling process?

Chain of custody Chain of custody is Documentation that describes evidence, including when it was collected, who collected it, its condition, and how it was secured and transferred from one responsible party to the next.

A WLAN has three wireless APs to allow users to move around the building while maintaining a Wi-Fi connection. The wireless access points are named WAP-A, WAP-B, and WAP-C. WAP-A is configure using mode Wireless-B on channel 6. WAP-B is configured using mode Wireless-G on channel 6, and WAP-C is configured using mode Wireless-G on channel 11. You want all users to connect at 54 Mbps and you want the APs to interfere with each other as little as possible. What should you change?

Change WAP-A to mode Wireless-G and channel 1 Since WAP-B and WAP-C are both using Wireless-G and channels 6 and 11, you want to configure WAP-A to use Wireless-G for 54 Mbps connections and channel 1 to avoid overlapping channels.

Installing Windows Server 2012 R2 Active Directory Domain Services installs two default policies: Default Domain Policy and Default Domain Controller Policy. The administrator needs different policy settings. How best to proceed?

Create new Group Policy Objects to augment or override the existing default settings.

Which of the following is the NOS typically NOT responsible for? Controlling the files a user can open Ensuring only authorized users have network access Controlling the speed of the CPU Managing data and other resources

Controlling the speed of the CPU

What is the term for the use of the same network to deliver multiple types of communication services such as video, voice, and fax?

Convergence

An administrator needs to grant an e-mail distribution group of 100 members access to a database, how would the administrator proceed? The e-mail group is obsolete and can be dissolved.

Convert the distribution group to a security group and then assign the group access permissions.

How does AppLocker handle all executables, installer packages, and scripts by default?

AppLocker blocks all by default, except for those specified in Allow rules.

What is AppLocker also known as?

Application Control Policies

What service does AppLocker require running to function properly?

Application Identity

What are the three primary event logs?

Application, Security, and System

What are the key benefits of security templates?

Apply consistent, scalable, and reproducible security settings throughout an enterprise.

When does Windows apply User Configuration policies by default?

As the user logs in

When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application?

Assigning forces the application, whereas publishing provides the option to install.

How are most Group Policy settings applied or reapplied?

At the refresh interval

At what level of the DNS hierarchy are actual hosts, apart from the root servers?

At the second-level domain level

What do you call the source responsible for maintaining a domain's resource records?

Authoritative source

Which of the following is NOT an assurance provided by encryption?

Authorization

Which of the following operations can you not perform on a service using Server Manager? (Choose all that apply) Stop a running service Start a stopped service Disable a service Configure a service to start when the computer starts

Disable a service Configure a service to start when the computer starts

A flood of ping messages overwhelm a router interface in attempt to deny legitimate users access to a network. What type of attack is occurring?

DoS

What is the only OU created by default after installing Active Directory?

Domain Controllers OU

What kinds of servers should NOT be DHCP clients?

Domain controllers, Internet web servers, and DHCP servers

What type of groups are centrally managed by Active Directory and provide a method for administrators to assign rights to users?

Domain local groups

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?

Domain, private, and public

Which of the following is used by 802.1X for network access control?

EAPoL 802.1X is a vendor-independent IEEE standard for securing transmission between nodes according to the transmission's port, whether physical or logical. 802.1X, also known as EAPoL, is commonly used with RADIUS authentication.

You have just installed some new Cat6 UTP cabling on the manufacturing floor of your company to connect some new PCs to the network. The cables had to be run past some heavy motorized machinery, but you verified that the cables do not exceed the maximum length and that termination was properly done. However, users are reporting slow performance and intermittent connectivity problems. Which of the following is a likely cause?

EMI Electromagnetic interference (EMI) is a type of interference that can be caused by motors, power lines, televisions, copiers, fluorescent lights, or other sources of electrical activity.

How could you set up CALNOW so that it works every time you log in using the Bash shell?

Edit .bashrc or .bash_profile to contain the lines: CALNOW=`cal`

The ability to scale cloud services and resources up or down easily refers to which cloud computing feature?

Elastic services

Which of the two types of virtual network adapters, synthetic or emulated, is called the legacy adapter and why?

Emulated is called the legacy adapter because it is a standard network adapter driver and communicates more slowly

A network technician sees a line in a Cisco router configuration that says: router rip What is the result of this configuration line?

Enables a distance vector routing protocol The router rip statement enables the Routing Information Protocol (RIP) which is a distance vector routing protocol.

A network administrator has been tasked with finding a location for a new datacenter in a new office building. The administrator is looking for a location that meets certain temperature and humidity requirements as well as suitable protection from outside elements and the availability of ample electrical power. What type of requirements is the administrator concerned with?

Environment limitations Environment limitations entail temperature and humidity requirements necessary for safe and reliable equipment operation.

While troubleshooting a problem, you believe the problem is with a router configuration but you don't have security privileges to change the router configuration? What should you do?

Escalate the problem

What protocol is used by the ping utility to send echo request and echo reply packets?

ICMP

A router configuration has the following statement: access-list 100 permit icmp host 192.168.1.200 172.16.0.0 0.0.255.255 What is the affect of this statement?

ICMP traffic is allowed from computer 192.168.1.200 to subnet 172.16.0.0/16

Which standard should your switch support if it will connect to an access point that is not near a wall outlet to supply it power?

IEEE 802.3af

Which of the following employs a set of rules which determine the level and type of access granted to a device when it joins a network?

NAC

Which of the following protects a network by monitoring traffic and creating alerts and is usually found in the DMZ?

NIDS

Which type of device can detect threats to the network and can take preventive measures to prevent the threat from reaching its destination?

NIPS

What is the primary purpose of name caching?

Name caching enables the second name resolution request for the same name to bypass the referral process.

Which of the following command-line tools do you use to join a computer to a domain? Net.exe Netsh.exe Netdom.exe Ipconfig.exe

Netdom.exe

Which OSI Model layer relies on routing protocols to find the best route for a packet?

Network

What does a firewall protect your company against?

Network intrusion attempts, such as a denial of service attack

Which of the following is required by the client-server model?

Network operating system

What is the key benefit for creating a virtual switch?

Virtual switches have unlimited ports, so there's no need to connect physical switches by uplinks or crossover circuits.

The synthetic network adapter in the child partition is a(n) ________.

Virtualization Service Client (VSC)

Which type of signal multiplexing is used with fiber-optic cable and divides a beam of light into 40 different wavelengths?

WDM

Which 802.11 encryption method uses a shared key for authenticating users and exchanging data and can be cracked in a few minutes?

WEP

What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?

Windows Firewall With Advanced Security snap-in for the Microsoft Management console

What service works with Group Policy to install, upgrade, patch, or remove software applications?

Windows Installer

When installing software using Group Policy, what file or files does an administrator use?

Windows Installer package files, or .msi files-modifications to the package files require transform files, or .mst files. Further, patch files are designated as .msp files.

What versions of Windows began support of multiple local GPOs?

Windows Server 2008 R2 and Windows Vista

Windows Server 2012 R2 requires what processor architecture? a. 64-bit processor only b. 32-bit processor and 64-bit processor c. Any processor provided it is physical, not virtual d. Minimum dual-core processor

a. 64-bit processor only

What permission do users have by default regarding printer access and the ability to manage documents? a. By default, all printers assign the Allow Print permission to Everyone. b. By default, all printers do not assign permission to any user. c. By default, all users have the Allow Manage Documents permission. d. By default, all printers assign the Allow Print permission to Administrators.

a. By default, all printers assign the Allow Print permission to Everyone.

Which of the following roles implement what can be classified as infrastructure services? (Choose all that apply)? a. DNS b. Web Server (IIS) c. DHCP d. Remote Desktop Services

a. DNS c. DHCP

In what scenario would an organization prefer centralized servers and storage to having individual servers and storage per department? a. Each department typically works with its own applications and documents, rarely needing access to other departments. b. Each department typically works with its own applications and documents, occasionally needing access to other departments. c. Everyone in the organization works with his or her own individual resources. d. Everyone in the organization works with the same set of resources.

a. Each department typically works with its own applications and documents, rarely needing access to other departments.

What is the purpose of the Remote Desktop Easy Print driver? a. Easy Print allows remote clients to print to local print devices via a print redirector. b. Easy Print allows administrators to configure printers for users connected remotely. c. Easy Print allows administrators to print to remote print devices via a print redirector. d. Easy Print allows remote configuration of all printers.

a. Easy Print allows remote clients to print to local print devices via a print redirector.

Which of the following Windows PowerShell cmdlets can you use to list the existing Windows Firewall rules on a computer running Windows Server 2012 R2? a. Get-NetFirewallRule b. Set-NetFirewallRule c. Show-NetFirewallRule d. New-NetFirewallRule

a. Get-NetFirewallRule c. Show-NetFirewallRule

Which of the following are requirements for extending a volume on a dynamic disk? a. If you want to extend a simple volume, you can use only the available space on the same disk, if the volume is to remain simple. b. The volume must have a file system before you can extend a simple or spanned volume. c. You can extend a simple or spanned volume if you formatted it using the FAT or FAT32 file systems. d. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

a. If you want to extend a simple volume, you can use only the available space on the same disk, if the volume is to remain simple. d. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

What is the key benefit behind delegating server administration? a. In larger networks, delegation uses permissions to restrict access b. In smaller networks, delegation provides formalized synergy c. In larger networks, delegation improves prioritization of tasks d. In smaller networks, delegation creates employment opportunities

a. In larger networks, delegation uses permissions to restrict access

Which of the following statements about effective access is not true? a. Inherited permissions take precedence over explicit permissions. b. Deny permissions always override Allow permissions. c. When a security principal receives Allow permissions from multiple groups, the permissions are combined to form the effective access permissions. d. Effective access includes both permissions inherited from parents and permissions derived from group memberships.

a. Inherited permissions take precedence over explicit permissions.

Concerning storage solutions, select the disk configuration that offers the least expensive disk consumption. a. Just a Bunch of Disks (JBOD) b. Disk mirroring c. RAID 5 d. RAID 3

a. Just a Bunch of Disks (JBOD)

What Windows Server 2012 R2 role enforces security policies for network users? a. Network Policy and Access Services b. Remote Access c. Active Directory Rights Management Services d. Remote Desktop Services

a. Network Policy and Access Services

Once a server is added to Server Manager, what actions are taken to permit remote server management? a. No further action is needed. For example, you may immediately use the Add Roles and Features Wizard. b. No further action is needed, because Windows Remote Management (WinRM) is enabled on the source Windows Server 2012 R2. c. No further action is needed because WS-Management Protocol is already running. d. No further action is needed thanks to Windows Management Instrumentation (WMI) and Windows PowerShell.

a. No further action is needed. For example, you may immediately use the Add Roles and Features Wizard.

The domain name part of a DNS name is _______ and consists of two or more words, separated by ______.

hierarchical; periods

Create a variable called iam and assign the results of the whoami command to it. Display the contents of the variable to verify your results.

iam=`whoami` echo $iam

Use the command that will enable you to view the documentation for ifconfig. Notice the many options for configuring your network connection.

ifconfig

Log in as root and try using ifconfig, netstat, and route. Also, when you use ifconfig, record the "inet addr" (IP) value for eth0 (your Ethernet address) or for lo (your localhost loopback address), such as 127.0.0.1 for lo.

ifconfig netstat route

Create a simple C program which declares the variable number as a local variable that is an integer.

int number; int main() { }

You are troubleshooting network connectivity on a desktop computer. You need to determine if the computer uses a static address or a dynamic address. Which tool should you use?

ipconfig The output from ipconfig will show whether the address is static or assigned by DHCP (dynamic).

If you have a computer with two network adapters and want to see the IP address configuration for all the adapters, which command should you use?

ipconfig /all

Which of the following is true about TCP?

it's connection-oriented

An attacker uses an RF transmitter to flood the air waves with wireless traffic; what type of attack has occurred?

jamming

kill [PID]

kills a process can find PID w ps

Which type of WAN connection is not shared with other users and has continuously available communications channels?

leased line

Use the let command to store the value 1024 in the variable ram. Display the contents of ram.

let ram=1024 echo $ram

What feature should you look for in a UPS if your electrical power has a lot of noise?

line conditioning

test -a

logical AND

test -o

logical OR

test !

logical negation

7. Write a script that creates the following menu: Soup Menu ========== (t)omato (b)ean (s)quash Select a soup ... (q) to quit

loop=y while [ "$loop" = y ] do clear 2 Guide to UNIX Using Linux Fourth Edition Chapter 6 Solutions tput cup 3 12; echo "Soup Menu" tput cup 4 12; echo "=========" tput cup 6 9; echo "(t)omato" tput cup 7 9; echo "(b)bean"" tput cup 8 9; echo "(s)squash" tput cup 10 9; echo "Select a soup ... (q) to quit" tput cup 11 9 read choice || continue done

What can you use to do a physical component test on a NIC?

loopback plug

Use a command to view the contents of the /etc/init.d directory to see a listing of services you can start on your computer. Do you see the portmap file

ls /etc/init.d

What does your mobile device need to do before it can access the Internet at a Wi-Fi hot spot?

make an association

export [-options] [variable name]

makes a shell var global so that it can be accessed by other scripts and programs

Run the man program with the argument df in the background. Record the PID of the process you have started.

man df&

case logic

match from a list (menu)

Create a variable called mem_size and set its contents to 1024. Next, use the test command to determine if the contents of mem_size is less than or equal to 512.

mem_size=1024 test $mem_size -le 512 echo $?

Which WAN topology should you use if you have four sites and want to provide the best availability between all sites?

mesh

Which WLAN layout uses several APs that work as peer devices on the same network?

mesh

The smallest amount of memory the VM can use at any time is called _______.

minimum RAM

You have just installed a new access point. You have both 802.11g and 802.11b Wi-Fi clients and only the 802.11g clients are able to connect. What is the most likely problem?

mismatched standards

Which command should you use to test IPv6 functionality on the local NIC?

ping ::1

A network technician is asked to send ICMPv6 packets to the IPv6 loopback address on her computer. What command will the technician use?

ping ::1 The ping command sends ICMPv4 or ICMPv6 packets. The loopback address for IPv6 is ::1.

Find out the IP address of a friend's computer or of a favorite Web site and use the command to poll that computer or Web site.

ping [ip address]

After deploying software by GPO using the Assigned option, where is the package made available for the user?

start menu or desktop

The three types of Group Policy Objects (GPOs) include local, domain and _____.

starter

What kind of GPO serves as a template for the creation of domain GPOs based on a standard collection of settings?

starter GPO

What type of firewall can inspect each packet to determine if it is part of a currently active connection?

stateful

You registered the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different _____.

subdomains of contoso.com

du [-options] [filesystem]

summarizes disk usage, with the default of presenting info by directory -a files and directories -b displays info in bytes -c creates a total at the end -h human readable -S omits size of subdirectories in totals for directories

What type of device is used to guard against momentary increases in voltage?

surge protector

Using Cisco iconography, what type of network device is represented by a small rectangular box that contains four arrows pointing in opposite directions?

switch

Which of the following is NOT a common WAN topology?

switched

Assign the variable t the value of 20. Next, assign the variable s the value of t+30. Finally, display the contents of t and s to verify you have correctly defined these variables.

t=20 let s=t+30 echo $t echo $s

test -e

tests existence of a file

test -d

tests for the existence of a specific directory

groff [-Tdev]

text formatting utility

Which of the following is true about routing protocols?

the lower the AD, the higher the priority

A packet arrives on a router interface that has an ACL. The packet is examined and does not meet any of the ACL rules. What happens next?

the packet is denied

PATH=$PATH:.

this stores your current working directory in path only for the duration of your login session. This way you don't have to type ./ in front of all scripts

What technique can be used to limit excessive bandwidth consumption by a particular user or group of users?

throttling

Which WAN topology forms a hierarchy and provides abundant flexibility and easy expansion?

tiered

You are examining the IP address of a computer and find that it is 169.254.44.100. How is that computer most likely configured?

to use a dynamic IP address

What tool is best used to verify the location of a wire's termination?

tone generator

Start the top utility. Type ? after the utility starts. What information do you see? Press Enter and stop the top utility.

top ? q

Start the top utility. Notice that top is listed as one of the most active processes. Determine what CPU percentage is used by running top. Stop the top utility.

top q

Start the top utility so that it updates every 20 seconds. Now do you see top in the list of the most active processes on your screen? Stop the top utility

top d 20 q

Use the touch command to create the file letters. Next use the dd command to make a backup of the file.

touch letters dd if=letters of=letters.bak

Use the tput command to clear the screen and then to place the cursor in row 7, column 22:

tput clear tput cup 7 22

Which utility uses the TTL value of an IP packet to elicit responses from routers along the path to the destination?

tracert

List all of the signal numbers and designations for the trap command. What is the designation for signal 31?

trap -l 31: SIGSYS

common signals with trap

trap 0 completion of shellscript trap 1 a hangup or logout signal trap 2 an interrupt has been received trap 3 a quit signal has been issued trap 4 an illegal instruction has been received trap 9 a termination signal has been issued trap 15 a program has been ended trap 19 a process has been stopped trap 20 a process has been suspended

To perform an offline domain join, how many times would an administrator run the Djoin.exe command?

twice

What property of twisted-pair cabling provides resistance to cross-talk?

twists

What type of antenna is best used for creating a wireless point-to-point link?

unidirectional

test [-options] [argument/expression/integer]

used to analyze an expression to see ifi its true, often used in shell scripts, to see if files exist

Resource access for individuals takes place through their ______.

user accounts

Use the vi editor to create and save the famous_words file with the following contents (including misspellings): Make a copy of the document using the dd command and calling the copy famous_words.bak. Use a tool to check and correct the spelling errors in the famous_words document.

vi famous_words dd if=famous_words of=famous_words.bak ispell famous_words

printenv

view list of current configuration(usually not changed) and environment (can be changed as needed) variables. You should to this before you change any

A _______, like its physical counterpart, is a device that functions at layer 2 of the Open Systems Interconnect (OSI) reference model.

virtual switch

If you are examining a system to look for weaknesses that could lead to compromised information, what are you looking for?

vulnerability

set [-options] [arguments]

w no options, displays the current listing of bash environment and shell script vars

Which of the following is a common fiber cable problem?

wavelength mismatch

trap [command] [signal number]

when a signal is received from the operating system, the argument included with trap is executed -l diplays a listing of signal numbers and meanings

Modify your whoisthere function so that you can enter "These are the folks logged in:" as an argument to appear before you list who is logged into the system.

whoisthere() { echo "$1" who -H }

Which tool can you use to help optimize Wi-Fi signal settings and help identify Wi-Fi security threats?

wireless analyzer

How should you configure an AP when it must provide remote access to a wired network?

wireless bridge

A hacker has discovered a system vulnerability and proceeds to exploit it to gain access to the system. The vulnerability is not yet known to the developer so no fix is available. What type of attack is this?

zero-day

Configuring a Central Store of ADMX files help solve the problem of ________.

"SYSVOL bloat"

bash shell prefix

#!/bin/bash

Rewrite the C program keyboard.c that you created earlier in this chapter to compile as a C++ program.

#include<iostream> using namespace std; int main(void) { char string[50]; float my_money; int weight; cout << "\nEnter your First Name: "; cin >> string; cout << "\nEnter your Desired Monthly Income: "; cin >> my_money; cout << "\nEnter your friend's weight: "; cin >> weight; cout << "\n\n Recap\n"; cout << "I am " << string; cout << " and I wish to have " << my_money; cout << " per month"; cout << "\nI never would have guessed your friend weighs " << weight; cout << "\n\n"; }

Create a program in which the user enters the outside temperature in Fahrenheit. If the temperature is 60 or over, print a comment that states "It is just fine outside." If the temperature is under 60, print a comment that states "It's not so warm outside."

#include<stdio.h> int main (void) { int temp; printf("\nEnter the outside temperature: "); scanf("%d", &temp); if (temp >=60) { printf("It is just fine outside.\n"); } else { printf("It's not so warm outside.\n"); } }

Write down four scalar variables, two of which are numeric and two that are strings.

$value = 45; $m = 90; $furniture = "desk"; $car = "Ford";

Where is the path to the default GPT structure for a domain?

%systemroot%\SYSVOL\sysvol\<domain name>\Policies

For DHCP address allocation, by how much is network traffic reduced related to periodic lease renewal messages when switching from dynamic allocation to automatic allocation?

100 percent because dynamic address allocation requires periodic lease renewal messages whereas automatic does not

Which Ethernet standard requires at least Cat 6 cabling and uses 2 wire pairs?

1000Base-TX

A fiber-optic network requires an Ethernet connection that will operate at 10 Gbps and will span almost 25 miles. Which Ethernet standard and type of cable should you use?

10GBase-ER, SMF

What is the length of the Source address field in an IPv6 packet?

128 bits

What is the default size for each of the three Event logs?

16,384 KB

You are setting up a VoIP system that involves 40 802.3af class 1 VoIP phones. You need to make sure your PoE switch will provide the necessary power to the phones operating at full power. What is the power requirement of the PoE switch?

160W 802.3af class I VoIP phones use about 4 Watts of power each.

Which of the following is a Class B IP address?

172.55.100.254

Which of the following best describes the IEEE 802.11g standard?

2.4 GHz, 54 Mbps The 802.11g standard operates in the 2.4 GHz frequency range and has a maximum transfer rate of 54 Mbps.

On which port would an SSL encrypted Web browsing session occur by default?

443 The HTTPS protocol uses SSL for encryption and operates over TCP port 443 by default.

What is the shorthand notation to specify that a device can deliver a maximum bandwidth of 5,000,000 bits per second?

5 Mbps

Which port is used by the DNS process?

53

What is the decimal equivalent to the binary number 00111101?

61 The correct answer is 61. There are 1 values in the 32, 16, 8, 4, and 1s place. Adding them together makes 61.

What is the default lease period for DHCP dynamic address allocation?

8 days

What is the typical incoming port number for a web server?

80

While examining a wireless client's connection properties, you notice that the connection type is listed as 802.11a-ht. Which Wi-Fi technology and frequency is being used?

802.11n, 5.0 GHz 802.11a-ht is a Wi-Fi connection designation that is used by some 802.11n network clients indicating that the connection is a high throughput (ht) 802.11a connection. 802.11a utilizes the 5.0 GHz frequency range.

You need to set up an adhoc network that has good performance, provides strong encryption, and is not easily discovered. What type of network should you configure?

802.11n, WPA2, no SSID broadcast 802.11n is the highest performing WLAN standard in the list. WPA2 is the strongest encryption in the list and if SSID broadcast is disabled, the network is not as easily discovered.

What are the beginning and end frequencies of the wireless spectrum, as defined by the FCC? (Choose two.)?

9 KHz 300 GHz The wireless spectrum is a continuum of electromagnetic waves used for data and voice communication. The wireless spectrum (as defined by the FCC, which controls its use) spans frequencies between 9 KHz and 300 GHz. Each type of wireless service can be associated with one area of the wireless spectrum.

glob/wildcard characters

?: one character, except \ and . *: zero or more characters [chars]: class of character, or range [a-z] or [1-5]

Which of the following are valid reasons why administrators might want to install their Windows Server 2012 R2 servers using the Server Core option? (Choose all that apply) A Server Core installation can be converted to the full GUI without reinstalling the operating system. The PowerShell 3.0 interface in Windows Server 2012 R2 includes more than 10 times as many cmdlets as PowerShell 2.0. The new Server Manager in Windows Server 2012 R2 makes it far easier to administer servers remotely. A Windows Server 2012 R2 Server Core license costs significantly less than a full GUI license.

A Server Core installation can be converted to the full GUI without reinstalling the operating system. The PowerShell 3.0 interface in Windows Server 2012 R2 includes more than 10 times as many cmdlets as PowerShell 2.0. The new Server Manager in Windows Server 2012 R2 makes it far easier to administer servers remotely.

What is an example of Automatic Private IP Addressing (APIPA) in IPv4?

A Windows workstation assigns itself an address on the 169.254.0.0./16 network

Regarding Group Policy in Windows Server 2008 and Windows Vista, Microsoft used the token-based administrative template (ADM) files. What did Microsoft replace ADM files with, which is used in Windows Server 2012 and Windows Server 2012 R2?

ADMX files (XML-based file format)

Which TCP/IP protocol works with IPv4 to map MAC addresses to IPv4 address?

ARP

Which WAN technology uses 53-byte cells to provide predictable performance?

ATM

Company policy requires all employees that use the company network to abide by a set of policies describing how they may use the network. What is this policy called?

AUP The acceptable use policy (AUP) is a portion of the security policy that explains to users what they can and cannot do, and penalties for violations. It might also describe how these measures protect the network's security.

You have just finished configuring a router on your corporate network that consists of several subnets. Some users have informed you that they have access to some of the servers, but not others. What is the most likely reason for this problem?

Access control lists Access control lists on routers can block access to particular devices on a subnet or entire subnets. Improper STP configuration would cause problems with switches. Since the router was just configured, that is most likely where the problem is.

What graphical tool can create user and computer accounts and was redesigned for Windows Server 2012?

Active Directory Administrative Center

What is the simplest way for administrators to upgrade their AD DS infrastructure to Windows Server 2012 R2?

Add a new Windows Server 2012 R2 DC to your existing Directory Services installation.

During the Windows Server 2012 R2 installation, what account creation prompts you for the password?

Administrator

What is the purpose of the Audit Policy section of a local GPO?

Administrators can log successful and failed security events, such as loss of data, account access, and object access.

What are the advantages of using a distributed DHCP infrastructure?

All the client/server network traffic is local, so minimal DHCP traffic on routers Clients have ready access to DHCP servers

When creating a firewall exception, what is the difference between opening a port and allowing an application through?

Allowing an application opens the specified port only while the program is running, and thus is less risky.

For the Windows Firewall private profile, what type of network is expected?

An internal network that is not accessible by unauthorized users

What does a differencing disk offer administrators?

An opportunity to experiment with no changes committed to the parent image

Which routing protocol uses a path vector algorithm?

BGP

A new multimode fiber optic cable was installed between an IDF and an MDF. Most of the cable run followed existing electrical conduit between facilities. The Ethernet standard in use is 1000Base-SX and the total length of the cable is 215 meters. However, after testing the cable, it was found that there was too much signal loss occurring to certify the installation. Which of the following is the most likely issue?

Bend radius limitations Bend radius is the radius of the maximum arc into which a cable can be looped without impairing data transmission. Fiber optic cable has a minimum bend radius of 15 times the cable diameter. The distance of 215 meters is okay. EMI and NEXT do not affect fiber optic cables.

What allows administrators to grant users in one domain access to resources of another domain within the same domain tree?

Bidirectional trust relationship between domains

A user gains access to the server room by submitting to a retina scan. What type of security control is in use?

Biometrics Biometrics uses unique physical characteristics of an individual, such as the color patterns in his iris or the geometry of his hand.

How does CSVDE.exe differ from LDIFDE.exe?

Both utilities can import users, but only LDIFDE can modify or delete objects later

Which device parameter does STP use to select the root bridge?

Bridge ID The Bridge ID is a combination of a 2-byte priority field and a bridge's MAC address, used in STP (Spanning Tree Protocol) to select a root bridge.

Which of the following is NOT a task typically performed by a router?

Build a table that maps MAC addresses to ports

What is the primary means by which people access resources on an AD DS network?

By having a user account

Order the steps to install a feature on a down-level server. Not all steps will be used. a. Display a list of the roles and features on the remote server by using the following command: Get-WindowsFeature b. Open a PowerShell session with administrative privileges. c. Log on to Windows Server 2012 R2 with administrative privileges. d. Establish a Windows PowerShell session with the remote computer by using the following command: Enter-PSSession <remote server name> -credential <user name> e. By using the short name of the role or service as it appears in the Get-WindowsFeature display, install the component using the following command: Add-WindowsFeature <feature name>

C Log on to Windows Server 2012 R2 with administrative privileges. B Open a PowerShell session with administrative privileges. D Establish a Windows PowerShell session with the remote computer by using the following command: Enter-PSSession <remote server name> -credential <user name> A Display a list of the roles and features on the remote server by using the following command: Get-WindowsFeature E By using the short name of the role or service as it appears in the Get-WindowsFeature display, install the component using the following command: Add-WindowsFeature <feature name>

A network has four subnets, 10.0.1.0/24, 10.0.2.0/24, 10.0.3.0/24 and 10.0.4.0/24. Mike's computer has an address of 10.0.3.28/24 but he cannot communicate with any of the computers on the 10.0.3.0/24 subnet. All other configuration is correct. Which of the following can solve the problem?

Change the VLAN assignment If a computer cannot communicate with other devices on the same subnet, the computer is probably connected to the wrong VLAN and the VLAN assignment should be changed.

While performing a network performance analysis, a technician examines the following output from one of his Cisco routers. The router is not performing up to expectations. What can be changed to improve performance? FastEthernet0/0 is up, line protocol is up Hardware is Gt96k FE, address is 000f.34e5.63b0 (bia 000f.34e5.63b0) Internet address is 172.31.1.250/16 MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255/n Encapsulation ARPA, loopback not set Keepalive set (10 sec) Half-duplex, 100Mb/s, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output 00:00:00, output hang never Last clearing of show interface counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max)

Change the duplex mode to full The interface is set to half duplex and should be set to full duplex for optimal performance.

When two or more WAPs are installed in close proximity, what must be different on each WAP to avoid problems?

Channel Wireless access points (WAPs) should use non-overlapping channels if the WAPs are in communication range of one another to avoid interference.

As defined by the original Internet Protocol standard, what are the three classes of IP addresses used for networks, and what differentiates them?

Class A, B, C, differing by how many bits distinguish the networks from the hosts

What GPO node presents the interface with which to configure Windows Firewall properties?

Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security

In what Group Policy objects container are AppLocker settings located?

Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker

Bill has installed ten new computers and a router in a new office complex. While testing, he discovers can can't communicate with the internet. He verifies that the router is configured correctly. The address on the computer he is using is set to 169.254.149.101. What should Bill do to resolve the problem?

Configure a DHCP server A DHCP server assigns dynamic IP addresses. IP addresses that begin with 169.254 are APIPA addresses which are assigned when no DHCP server can be found.

All wireless devices that are permitted to connect to your wireless network are currently connected. You want to make sure that only those currently connected devices can connect to the WAP in the future. What is the best way to do this while not disrupting service to connected devices?

Configure a MAC address filter A MAC address filter will disallow all MAC addresses from associating with the WAP except those listed in the filter.

What should you configure on a WAP if you want guests to be able to connect to your wireless network without having to provide them with any additional information?

Configure encryption to Open Open encryption will allow guest users to access a wireless network without an encryption key or pass phrase. However, the connection will not be secure.

Which of the following should you configure to allow users on the private network to access a Web server using a private address while allowing external users to access the Web server using its public address?

Configure split horizon DNS Split horizon DNS (or simply, split DNS) is an implementation of DNS where internal and external DNS queries are handled by different DNS servers or by a single DNS server that is specially configured to keep internal and external DNS zones separate.

In what type of attack does a hacker use programs to try many different words to guess a password?

Dictionary attack

Which of the following is NOT a type of fiber-optic cable connector?

DB

You are configuring some new network printers and you want to be sure the printers are always dynamically assigned the same IP address. What should you configure?

DHCP reservation A DHCP reservation maps the MAC address of a host device to an IP address from the DHCP scope to ensure the host always receives the same IP address unless its MAC address changes.

What is the first packet sent to a DHCP server when a computer boots up?

DHCPDISCOVER

How do DHCP servers respond to a DHCPDISCOVER message?

DHCPOFFER

A web server must be placed on a segment of the network that easily allows both internal and external users to access it. What type of network segment should be configured on the firewall?

DMZ A demilitarized zone (DMZ) is a network segment that provides access to both internal and external users. It is an area on the perimeter of a network that is surrounded by two firewalls—an external firewall that is more porous to allow more types of access, and an internal firewall that is more hardened to provide greater protection to the internal network.

Name caching enables the second name resolution request for the same name to bypass the referral process.

DNS

You are setting up a network in a new office. You have been asked to ensure that users can access all the network servers using the name of the server such as server1.domain.local. What do you need to configure?

DNS server A domain name service (DNS) server resolves domain names to IP addresses.

Which of the following standardizes broadband cable and defines multiple channels?

DOCSIS 3.0

Which of the following operates over the PSTN and uses data modulation techniques at the Physical layer of the OSI model to achieve high throughput?

DSL

What device aggregates multiple DSL subscriber lines and connects them to the carrier's CO?

DSLAM

The carrier's endpoint device is referred to as which of the following?

Data Communications Equipment

Which part of a computer's address is used by the host to access another network?

Default gateway

Your DHCP servers are burdened with heavy traffic, most related to IP address renewals. Unfortunately, virtually all the IP addresses in each of your subnets are allocated. Which option is the best way to lower the renewal traffic?

Deploy additional DHCP servers on the most burdened subnets.

What command-line utility requires you know the SAM account name as well as the user login ID before creating user accounts?

Dsadd.exe

You arrive at a customer site to resolve a problem with a router. After logging on to the router, you find that it uses a different operating system than the routers you are familiar with. Which troubleshooting step should you take next?

Escalate the problem Since you cannot determine or implement a solution, you should escalate the problem.

You have just finished a new network installation that includes ten servers and 150 workstations. You have been told to gather performance metrics on the network that can be compared to future performance metrics. What should do?

Establish a baseline A baseline is a record of how a network operates under normal conditions (including its performance, error statistics, utilization rate, and so on). Baselines are used for comparison when conditions change.

A cable installer is terminating a new cable using an ST connector. Which of the following tools does he need? (Choose two.)

Fiber cleaver Fiber Stripper An ST connector is used to terminate fiber-optic cable. A fiber stripper is used to remove the jacket and bugger on a fiber strand. A fiber cleaver is used to make a clean cut at the end of the fiber strand.

Which of the following is a Transport layer protocol used on fiber-optic media instead of TCP or UDP?

Fibre Channel

When configuring software restriction policies, there are four rules that help determine the programs that can or cannot run. Select which of the following is NOT one of those rules.

File Location Rule

Create a Perl program that sorts the numbers 115, 10, 19, 35, and 2 and that uses the spaceship operator to accomplish the sort.

First create a data file, such as a file called numberlist that contains the numbers 115, 10, 19, 35, and 2 (with each number on a separate line). #!/usr/bin/perl # Program name: exercise9.pl $x = 0; while (<>) { $somelist[$x] = $_; $x++; } @sortedlist = sort numbers @somelist; print @sortedlist; sub numbers { $a <=> $b } chmod ./exercise9.pl numberlist

Which WAN technology uses a DLCI to identify the circuit that routers should use to forward frames?

Frame relay

In which type of PDU will you find CRC errors?

Frames The CRC is found in the frame check sequence (FCS) field of a frame. CRC errors are detected on frames by the receiving network interface.

While monitoring an interface statistics on a server, a technician sees a number of packets that exceed the MTU. What are these types of packets called?

Giant A giant is a packet that exceed the medium's maximum transmission unit (MTU) size. For example, an Ethernet packet larger than 1518 bytes is considered a giant.

What is the group scope for Domain Admins, Domain Controllers, and Domain Users default groups?

Global

What is the primary difference between universal groups and global groups in Windows Server 2012 R2?

Global groups use less data in the global catalog. So, in considering replication traffic, universal groups should be within a site.

Which feature must you add to a Windows Server 2012 R2 Server Core installation to convert it to the Minimal Server Interface? Graphical Management Tools and Infrastructure Server Graphical Shell Windows PowerShell Microsoft Management Console

Graphical Management Tools and Infrastructure

Which features must you remove from a full GUI installation of Windows Server 2012 R2 to convert it to a Server Core installation? (Choose all that apply) Windows Management Instrumentation Graphical Management Tools and Infrastructure Desktop Experience Server Graphical Shell

Graphical Management Tools and Infrastructure Server Graphical Shell

What is an important difference between groups and OUs?

Group memberships are independent of the domain's tree structure.

How do groups differ from OUs?

Groups are security principals, meaning you assign access permissions to a resource based on membership in a group. OUs are for organization and for assigning Group Policy settings.

Temporarily change your home directory environment variable to /home and then use one command to go to your home directory. Change the home directory environment variable back to your regular home directory and switch to it.

HOME="/home" cd HOME="/home/username" cd

What should you look for if you want to know if your Web browser session is secure?

HTTPS

A network technician has been asked to make a connection between two switches in an IDF and MDF using 100BaseFX Ethernet. The IDF and MDF are about 65 meters apart. The technician brings an adequate length of Cat6a cable to make the connection but finds that he is unable to make a connection. What is the problem?

He needs a multimode fiber cable 100BaseFX is an Ethernet standard that operates at 100 Mbps over multimode fiber optic cable.

In a broadband cable network, what do all the nodes in a neighborhood connect to at the central office?

Head-end

What should you look for in a wireless signal to ensure that the signal is strong and has little interference?

High SNR

What Server Manager tool allows you to create a new virtual hard disk?

Hyper-V Manager

What is the primary graphical tool for creating and managing virtual machines?

Hyper-V Manager

How does a SAN work with VMs in Windows Server 2012 R2?

Hyper-V virtualizes the SAN and makes the WWNNs and WWPNs available to the VM.

Which routing protocol is an IGP, uses a link-state algorithm and is easy to adapt to IPv4?

IS-IS

Which of the following is an IPsec component that establishes policies for managing keys?

ISAKMP

What is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)?

ISATAP emulates an IPv6 link for use on an IPv4 network.

Which WAN technology is circuit-switched and uses the PSTN?

ISDN

For virtual network adapters, Hyper-V assigns a value up to 256 to create individual MAC addresses. What happens if this is not sufficient?

If more than 256 adapters are needed, an administrator can modify the MAC address pool to be larger.

A network administrator configured an ACL on a router intended to prevent access from subnet 172.20.0.0/16 to two servers on subnet 172.23.0.0/16. The entire ACL looked as follows: deny ip 172.20.0.0 0.0.255.255 host 172.23.1.200 deny ip 172.20.0.0 0.0.255.255 host 172.23.1.201 After performing some testing, the administrator finds that no packets from any subnet are reaching the servers or any other device on the 172.23.0.0/16 subnet. What is the most likely problem?

Implicit deny An implicit deny is an ACL rule which ensures that any traffic the ACL does not explicitly permit is denied by default. You do not see this rule in the actual ACL. In this case, because there are no permit statements, all traffic is denied due to the implicit deny.

What is the simplest way to deploy a security template on several computers simultaneously?

Importing the security template into a GPO

Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic?

Inbound-block all. Outbound-permit all

Mike has installed a computer into a new office and has configured a static IP address. He plugs the cable into the switch in the IDF and sees a link light. However, while testing network connectivity, he finds that he cannot communicate with any network devices on the local subnet. He verifies that the IP address is correctly configured. What is a likely cause of the problem?

Incorrect VLAN assignment If a computer is assigned to the wrong VLAN, it will not be able to communicate with devices on the local subnet.

An engineering firm currently has 100 users on a 1000BaseT network that has a single subnet. The company needs to isolate its engineering and accounting departments to increase security and for broadcast containment, while still allowing all computers to communicate with one another. What can you do to satisfy these requirements?

Install a layer 3 switch and configure ACLs An access control list (ACL) is a list of statements used by a router or layer 3 switch to permit or deny the forwarding of traffic on a network based on one or more criteria. A layer 3 switch will allow VLANs to be created for broadcast containment and will route between the VLANs to allow communication among all computers.

Last year your company implemented a network management system that used secure communications to transfer data to a central management station. An exploit of the encryption method used to transfer the data has been discovered recently. Which of the following should be done to try to eliminate the threat caused by the exploit?

Install available patches Patches are software updates that are designed to fix bugs and security vulnerabilities.

Who is responsible for the ratification of new top-level domains?

Internet Corporation for Assigned Names and Numbers (ICANN)

Which of the following is NOT a common issue to look out for when troubleshooting a misconfigured remote access device?

Invalid ARP table

When a local DNS server queries a TLD server, what kind of query does it send?

Iterative

Five computers are connected to a switch in a star topology. What type of network is this?

LAN

You are testing an internetwork of five subnets A-E. All local communication within each subnet is working. From subnet A, you can ping devices in subnet B and C, but you cannot ping devices in subnets D and E. From subnet D, you can ping devices in subnet E, but not subnets A, B or C. At which layer of the OSI model is the problem most likely occurring?

Layer 3 Communication problems between subnets usually mean routing problems which are devices that work at the Network layer, layer 3.

Which routing protocol algorithm enables each router to independently map the network to determine the best path and is used in IGPs?

Link-state

What is the proper term for associating a Group Policy to a set of AD DS objects?

Linking

What is the most common way to implement software restriction policies?

Linking Group Policy objects to Active Directory Domain Services containers, so that you can apply their policy settings to several computers simultaneously

What tool for user creation provides full access to all local user and group accounts on the computer?

Local Users and Groups snap-in

Which of the following is the most likely cause of intermittent disconnects and slow download speeds on a wireless network?

Low signal strength Low signal strength can cause intermittent disconnects and slow download speeds. If the security settings, SSID, or subnet mask were not correct, there would likely be no connectivity.

Which type of address is embedded on a NIC?

MAC address

Which security technique prevents an AP from authenticating a device that has not been approved?

MAC filtering

Where are you most likely to find an organization's main servers?

MDF

What protocol can be used to bond multiple T-3 lines to provide a higher bandwidth link?

MLP

Which WAN technology uses label switching to enable packet-switching technologies onto circuit-switched networks?

MPLS

Which of the following explains how to properly handle substances such as chemical solvents and how to dispose of them?

MSDS

While cleaning loose-tube fiber optic cables, a technician gets some of the cleaning solvent near his eyes. Which of the following should the technician check to see how to deal with the problem?

MSDS When dangerous substances are involved, the material safety data sheet (MSDS) for the substance should be inspected to see how to deal with it.

Which wireless innovation allows an AP to service multiple clients simultaneously?

MU-MIMO

You have configured an email server for your company. You need to make sure the mail server name can be resolved from an email address. What do you need to create?

MX record A Mail Exchanger (MX) record identifies a mail server for a domain.

Every network adapter has a hardware address. What is the common name for it and how long is it?

Media Access Control (MAC) address, 6 bytes

In the event physical memory is insufficient to satisfy buffer demands for all VMs, the VM with the higher _____ wins.

Memory weight

You are using differencing disks for multiple virtual machines (VMs) to preserve the parent image from changes. Now you want to combine the two images together. What PowerShell cmdlet allows you to do this?

Merge-VHD

While troubleshooting a desktop computer's connection to the internetwork, a network technician runs ipconfig and finds the following output: Ethernet adapter Ethernet0: Connection-specific DNS Suffix . : Link-local IPv6 Address . . . . . : fe80::ec42:7e6a:d2d4:5410%20 IPv4 Address. . . . . . . . . . . : 172.31.210.1 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : Why can't this computer communicate with devices on the 172.16.0.0/16 subnet?

Missing default gateway A default gateway must be present to communicate with other subnets.

You need a device that will perform STP, will allow you to configure VLANs, and can route between the VLANs. What type of device do you need?

Multilayer switch A multilayer switch performs both layer 2 and layer 3 functions, so it can perform traditional switch functions such as Spanning Tree Protocol (STP) and VLANs, but also route packets between VLANs.

You are asked to install software that is part of a NAC. This software will perform a posture assessment and then uninstall itself after sending results to the manage station. What should you install?

Non-persistent agent A non-persistent agent is agent software that remains on a device long enough to verify compliance and complete authentication, and then uninstalls. Persistent agents and non-persistent agents are often part of a network access control (NAC) solution.

Which technology uses fiber optic cabling and has a bandwidth of 155.52 Mbps?

OC3 OC3 is a popular throughput rate for fiber optic network services, providing a maximum 155.52 Mbps.

What device should you use to measure the amount of light that is transmitted on a fiber-optic line?

OPM

Which of the following is most important to have in place to maintain business continuity in the event of a fire or flood that disables your entire site? (Choose two.)

Offsite backups Warm site A warm site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, though only some are appropriately configured, updated, or connected to match the network's current state. An offsite backup would be required to bring all the servers in the warm site up to date.

Which of the following is the correct scalability limit of Hyper-V in Window Server 2012?

One server can host as many as 1,024 active virtual machines, with each virtual machine up to 64 virtual CPUs and 1 TB of memory

Order steps to add a print server. Not all steps will be used. a. Select the print server you want to add to the console and click Select Server. The server you select appears in the Add servers box in the Add/Remove Servers dialog box. b. In the Server Manager window, click Tools > Print Management. The Print Management console appears. c. Log on to Windows Server 2012 R2 with administrative privileges. d. Click Add to List. The server you select appears in the Print Servers list. e. In the Specify Print Server section, click Browse. The Select Print Server dialog box appears.

Order the steps to add a print server. C Log on to Windows Server 2012 R2 with administrative privileges. B In the Server Manager window, click Tools > Print Management. The Print Management console appears. B Right-click one of the printer icons and, from the context window, select Printer. E In the Specify Print Server section, click Browse. The Select Print Server dialog box appears. A Select the print server you want to add to the console and click Select Server. The server you select appears in the Add servers box in the Add/Remove Servers dialog box. D Click Add to List. The server you select appears in the Print Servers list.

Order the steps to add servers to Server Manager. Not all steps will be used. a. Select the servers you want to add and click the right arrow button to add them to the Selected list. b. Log on to Windows Server 2012 R2 with administrative privileges. c. From the Manage menu, select Add Servers. The Add Servers dialog box appears. Select one of the following tabs: Active Directory, DNS, or Import (all varying ways to search for the server to add). d. Have a second administrator authenticate the server addition. e. In the Server Manager navigation pane, click the All Servers icon.

Order the steps to add servers to Server Manager. B Log on to Windows Server 2012 R2 with administrative privileges. E In the Server Manager navigation pane, click the All Servers icon. C From the Manage menu, select Add Servers. The Add Servers dialog box appears. Select one of the following tabs: Active Directory, DNS, or Import (all varying ways to search for the server to add). A Select the servers you want to add and click the right arrow button to add them to the Selected list.

Order the steps to install a role or feature using Server Manager. a. Select the destination server b. Choose the Select Installation Type (Role-based or Feature-based installation selected) c. Add required features or services the needed service depends upon d. Log on with administrative privileges and start Server Manager e. Select the server role f. From the Manage menu, select Add Roles and Features

Order the steps to install a role or feature using Server Manager. D Log on with administrative privileges and start Server Manager. F From the Manage menu, select Add Roles and Features. B Choose the Select Installation Type (Role-based or Feature-based installation selected). A Select the destination server. E Select the server role. C Add required features or services the needed service depends upon.

Order the steps to assign basic NTFS permissions. a. Log on to Windows Server 2012 R2 with administrative privileges. b. From the Shares tile, right-click a share and, from the context menu, select Properties. c. Select the type of permissions to assign (Allow or Deny). d. In Server Manager, click the File and Storage Services icon. In the submenu, click Shares. e. In the Advanced Security Settings dialog box, the Permissions tab shows the Permissions List. Click Add to add a Permission Entry. f. Select a principal (for example, user, computer, service account, or group). g. Click Permissions, and then click Customize Permissions. h. From the Applies To drop-down list, specify the subfolders and files that should inherit permissions you're assigning.

Order the steps to assign basic NTFS permissions. A Log on to Windows Server 2012 R2 with administrative privileges. D In Server Manager, click the File and Storage Services icon. In the submenu, click Shares. B From the Shares tile, right-click a share and, from the context menu, select Properties. G Click Permissions and Customize Permissions. E In the Advanced Security Settings dialog box, the Permissions tab shows the Permissions List. Click Add to add a Permission Entry. F Click Add, then select a principal (for example, user, computer, service account, or group). C Select the type of permissions to assign (Allow or Deny). H From the Applies To drop-down list, specify the subfolders and files that should inherit permissions you're assigning.

Order the steps to assign printer permissions. a. Click Add, and then select a principal (for example, user, computer, service account, or group) to add. b. Right-click one of the printer icons and, from the context window, select Printer Properties. c. Log on to Windows Server 2012 R2 with administrative privileges. d. Open the Control Panel and select Hardware > Devices and Printers. e. Click the Security tab of the printer's Properties sheet. f. Select the type of permissions to assign (Allow or Deny).

Order the steps to assign printer permissions. C Log on to Windows Server 2012 R2 with administrative privileges. D Open the Control Panel and select Hardware > Devices and Printers. B Right-click one of the printer icons and, from the context window, select Printer Properties. E Click the Security tab of the printer's Properties sheet. A Click Add, and then select a principal (for example, user, computer, service account, or group) to add. E Select the type of permissions to assign (Allow or Deny).

Order the steps to create a folder share. a. Select a File share profile option: SMB Share-Quick, SMB Share-Advanced, SMB Share-Applications, NFS Share-Quick, and NFS Share-Advanced. b. Click Shares in the submenu and, from the Tasks menu, select New Share. c. Select the Server, path, and share name. d. Log on to Windows Server 2012 R2 with administrative privileges. e. Configure share settings: Enable access-based enumeration, Allow caching of share, Enable BranchCache on the file share, and Encrypt data access. f. Open Server Manager and click the File and Storage Services icon. g. Specify permissions to control access and click Next to confirm and create.

Order the steps to create a folder share. D Log on to Windows Server 2012 R2 with administrative privileges. F Open Server Manager and click the File and Storage Services icon. B Click Shares in the submenu and, from the Tasks menu, select New Share. A Select a File share profile option: SMB Share-Quick, SMB Share-Advanced, SMB Share-Applications, NFS Share-Quick, and NFS Share-Advanced. C Select the Server, path, and share name. E Configure share settings: Enable access-based enumeration, Allow caching of share, Enable BranchCache on the file share, and Encrypt data access. G Specify permissions to control access and click Next to confirm and create.

Order the steps to create and register a Windows Server Migration Tools Distribution Folder, ending with the use of the migration tools in a new PowerShell session. a. Start the destination server and log on with administrative privileges b. Copy the distribution folder to the source server c. Run the SmigDeploy.exe program with the appropriate command-line switches for the platform and operating system version of the source server, using the following syntax: SmigDeploy.exe /package /architecture [x86|amd64] /os [WS08|WS08R2|WS03] /path <deployment_folder_path> d. Type: Add-PSSnapin Microsoft.Windows.ServerManager.Migration e. At a command prompt on the destination server's folder, type: SmigDeploy.exe

Order the steps to create and register a Windows Server Migration Tools Distribution Folder, ending with the use of the migration tools in a new PowerShell session. A Start the destination server and log on with administrative privileges. C Run the SmigDeploy.exe program with the appropriate command-line switches for the platform and operating system version of the source server, using the following syntax: SmigDeploy.exe /package /architecture [x86|amd64] /os [WS08|WS08R2|WS03] /path <deployment_folder_path> B Copy the distribution folder to the source server. E At a command prompt on the destination server's folder, type: SmigDeploy.exe D Type: Add-PSSnapin Microsoft.Windows.ServerManager.Migration

Order the steps to install Windows Server 2012 R2. a. Select the appropriate language, time and currency format, and so on b. After accepting the license terms, select the type of installation c. Boot up the computer with the Windows Server 2012 R2 DVD d. Select whether a clean installation or an upgrade e. Enter the password associated with the new Administrator account f. Select a partition on which to install or create a new partition

Order the steps to install Windows Server 2012 R2. C Boot up the computer with the Windows Server 2012 R2 DVD. A Select the appropriate language, time and currency format, and so on. B After accepting the license terms, select the type of installation. D Select whether a clean installation or an upgrade. F Select a partition on which to install or create a new partition. E Enter the password associated with the new Administrator account.

Order the steps to install a role or feature to an offline VHD file. a. From the Manage menu, select Add Roles and Features b. Choose the Select Installation Type (Role-based or Feature-based installation selected) c. Log on with administrative privileges and start Server Manager d. For Destination server, select Virtual Hard Disk e. Close the wizard to dismount the VHD f. Type in or browse to the location of the VHD file you want to modify g. Select the role and required features

Order the steps to install a role or feature to an offline VHD file. C Log on with administrative privileges and start Server Manager. A From the Manage menu, select Add Roles and Features. B Choose the Select Installation Type (Role-based or Feature-based installation selected). D For Destination server, select Virtual Hard Disk. F Type in or browse to the location of the VHD file you want to modify. E Close the wizard to dismount the VHD. G Select the role and required features.

What type of DNS server holds the master copy of a DNS zone and is responsible for transferring the data to another server when changes are made to the zone?

Primary

Order the steps to set share permissions. a. In Server Manager, click the File and Storage Services icon. In the submenu, click Shares. b. Log on to Windows Server 2012 R2 with administrative privileges. c. Select the type of permissions to assign (Allow or Deny). d. Click Permissions and Customize Permissions. e. Click Add, and then select a principal (for example, user, computer, service account, or group). f. Click the Share tab. g. From the Shares tile, right-click a share and, from the context menu, select Properties.

Order the steps to set share permissions. B Log on to Windows Server 2012 R2 with administrative privileges. A In Server Manager, click the File and Storage Services icon. In the submenu, click Shares G From the Shares tile, right-click a share and, from the context menu, select Properties D Click Permissions and Customize Permissions. F Click the Share tab E Click Add, and then select a principal (for example, user, computer, service account, or group). C Select the type of permissions to assign (Allow or Deny).

Order the steps to set up a Windows PowerShell Web Access Gateway server. a. Create Authorization rules. b. Install the Windows PowerShell Web Access feature. c. Configure the IIS gateway. d. Install .NET Framework 4.5 and the Web Server (IIS) role.

Order the steps to set up a Windows PowerShell Web Access Gateway server. B Install the Windows PowerShell Web Access feature. D Install .NET Framework 4.5 and the Web Server (IIS) role. C Configure the IIS gateway. A Create Authorization rules.

Order the steps to upgrade to Windows Server 2012 R2. a. Migrate services and applications b. Perform an in-place upgrade on Windows Server 2003 servers c. Install a clean instance of Windows Server 2012 R2. d. Check hardware and application compatibility and disk space e. Perform a full backup

Order the steps to upgrade to Windows Server 2012 R2. D Check hardware and application compatibility and disk space E Perform a full backup. C Install a clean instance of Windows Server 2012 R2. A Migrate services and applications.

What is a container object that functions in a subordinate capacity to a domain, and still inherits policies and permissions from its parent objects?

Organizational unit

Which type of network is the smallest geographically?

PAN

In what type of motherboard slot are you most likely to install an Ethernet NIC on a new computer?

PCIe

Which VPN tunneling protocol use GRE to transmit data frames through the tunnel?

PPTP

Which type of DNS resource record is used for reverse lookups?

PTR

Which type of cloud computing service model should you consider if you want to develop and test an application that works on multiple operating systems?

PaaS

Which of the following is found in the intermediate distribution frame and is used to terminate cabling coming from the work area?

Patch panel Patch panels are found in the intermediate distribution frame (IDF). Work area cabling runs from computer wall jacks to a patch panel in the IDF.

Management wants the network to be tested to see if it is vulnerable to outside attacks. What type of testing is required?

Penetration testing Penetration testing is process of scanning a network for vulnerabilities and investigating potential security flaws.

One of your network technicians recently downloaded an update for her NIC on her Windows PC. After the update, the PC started experiencing slow performance and intermittent system errors and reboots. Which of the following should be done to resolve this problem as quickly as possible?

Perform a driver rollback Rollback is the process of reverting to a previous version of software after attempting to patch or upgrade it.

Which OSI Model layer sends bits over wired or wireless media?

Physical

Which document do you need to update if you update a server to Windows Server 2012 R2 from Windows Server 2008?

Physical network diagram The physical network diagram includes server location and the operating system installed.

What does the Transport layer use as an addressing method to identify an application running on a host?

Port number

What is the purpose of the split horizon feature used in distance vector routing protocols?

Prevent routing loops Split horizon is a method for preventing routing loops. This Layer 3 technology is employed by distance-vector routing protocols to ensure that a router knows which of its interfaces received a routing update so the router will not retransmit that same update back on the same interface.

Your company will be using new accounting software provided by a third-party that will host the application exclusively for your company's use. What type of cloud computing model is your company using?

Private SaaS Software as a Service (SaaS) is a cloud computing service model in which applications are provided through an online user interface and are compatible with a multitude of devices and operating systems. A private SaaS means that the service is hosted exclusively for a particular organization.

What is the difference between a private virtual switch and an internal virtual switch?

Private switch allows communication between child partition VMs only, whereas an internal includes the parent partition.

What type of software can you use to capture and examine the contents of network messages?

Protocol analyzer

After performing some network upgrades with new switches and cables, you notice the activity lights on all the switches are extremely active and the network is performing very sluggishly. You think this could be the result of a broadcast storm. What tool can you use to see if you are correct?

Protocol analyzer A protocol analyzer can capture packets and determine if an inordinate number of broadcasts are occurring.

In Windows Firewall Customized Settings, there are three profiles (public, private, and domain). What differentiates these profiles from each other?

Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.

If an administrator wants to enable the "Block all incoming connections, including those in the list of allowed apps" setting, to which of the firewall profiles does it apply?

Public, private, and domain

Which authentication protocol provides AAA services, and runs in the Application layer over UDP?

RADIUS

What type of connector is used with UTP cabling for Ethernet applications?

RJ-45

A network technician connects to a Cisco router's console using a rollover cable connected to the DB-9 connector on his laptop? Which communication standard is in use?

RS-232 A DB-9 connector is used to connect to a computer's serial port. A rollover cable connects from a Cisco console port to a computer's serial port and uses the RS-232 serial communication standard.

What is the primary benefit of a DNS forwarder?

Reducing the traffic and making efficient use of available bandwidth across the network perimeter

Which of the following roles must be installed in order to deploy a DHCP Relay Agent on Windows Server 2012 R2?

Remote Access

Fiber optic cables with an 8 micron core were run from a patch panel in an IDF to a patch panel in the MDF. The network technician used an MMF patch cable to connect from the patch panel to a 10GBaseF switch port in both the IDF and the MDF. However, the technician is not getting a positive link status on either switch port. What should the technician do?

Replace the MMF patch cables with SMF patch cables Because the fiber optic cable run between the IDF and MDF has an 8 micron core, that means the cable is single mode fiber (SMF). You can't use a multimode fiber (MMF) patch cable to connect an SMF cable. This is a fiber type mismatch.

What is Resource Metering?

Resource metering documents virtual machine usage regarding a variety of criteria

What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?

Restricted Groups policy

What are the servers at the top of the DNS hierarchy called?

Root servers

What kind of device should you install if you need the device to perform network address translation, facilitate access to the Internet, and perform packet filtering?

Router A router can perform all the described functions. Switches, hubs, and APs cannot perform these functions.

What is the SAM account name and the User Principal Name for the account [email protected]?

SAM account name is ella, and the User Principal Name is [email protected]

Which device are you most likely installing if you are using the iSCSI protocol?

SAN

Which of the following is a hash algorithm that is resistant to collisions and supports a 512-bit hash?

SHA-2

You are planning to configure a video conferencing system that will use TCP/IP. You need to study the protocols and devices you might be using to deploy the system. Which of the following are you likely to study? (Choose two.)

SIP H.323 terminal Session Initiation Protocol (SIP) and H.323 are used in multimedia applications such as video conferencing.

You have a 10 micron core fiber-optic cable that must connect with a 50 micron core fiber-optic cable. What do you need?

SMF to MMF converter

What protocol does an email client use to send an email to the first server?

SMTP

Which WAN technology uses a dual-ring topology over fiber-optic cable which provides a self-healing network?

SONET

Which of the following is an example of command-line remote virtual computing software?

SSH

Which protocol creates a secure channel between two computers and is a client-server command-line application?

SSH

Which of the following might you want to use to perform in-band switch management? (Choose two.)

SSH Telnet Telnet and SSH are used to connect to a managed device over the network which is in-band management.

What type of VPN is accessed through a Web browser?

SSL VPN

What type of encryption does HTTPS use and what protocol and port number does it use?

SSL/TLS, TCP 443

What is the transmission called used by TCP to request a connection?

SYN

If an administrator creates a domain tree in an Active Directory forest, and then creates a separate and different domain tree, what is the relationship between the two domain trees?

Same security entity as one Active Directory forest, bidirectional trust between domain trees

Which technology can transmit and receive signals in the 2.7 to 3.5 GHz range and uses a transponder to receive uplink signals?

Satellite

What characteristic of wireless signals is caused by objects with small dimensions and rough surfaces?

Scattering

Which of the following are reasons to segment a network? (Choose two.)

Security Performance Segmenting a network decreases broadcast traffic on each subnet and can increase performance. By segmenting a network security can be enhanced by using access control lists (ACLs) on routers between the segments. Adding routers increases cost and complexity.

A subnet contains 450 workstations and 15 servers. A recent network monitoring session has determined that there is a high number of broadcast packets utilizing bandwidth and degrading performance. It has been determined that there are no malfunctioning devices; the broadcasts are normal traffic. You want to decrease the overall percentage of broadcast traffic. Which of the following is most likely to help?

Segment the network To decrease the percentage of broadcast traffic on a network, the network can be segmented to create additional broadcast domains, therefore decreasing the percentage of broadcast traffic on each subnet.

Which of the following statements about Server Manager is not true? Server Manager can deploy roles to multiple servers at the same time. Server Manager can deploy roles to VHDs while they are offline. Server Manager can install roles and features at the same time. Server Manager can install roles and features to any Windows Server 2012 R2 server on the network.

Server Manager can deploy roles to multiple servers at the same time.

What types of operating systems are allowable as virtual machine?

Several Microsoft and non-Microsoft OSs such as CentOS 6.0-6.2, Red Hat Enterprise Linux 6.0-6.2, SuSE Linux Enterprise Server 11 SP2

One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, reliable Internet access. You have been asked to connect the branch office with the main office with a secure connection that uses their existing network infrastructure. What do you recommend?

Site to site VPN A site to site VPN is used to securely connect two networks using the existing Internet connection available at both networks. A host to site VPN is used to securely connect a single host computer with a network.

Assuming your virtual machines has dynamic memory enabled, when does Smart Paging actually trigger?

Smart Paging will only trigger if a VM has shrunken below its Startup RAM toward its Minimum RAM setting.

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?

Software settings, Windows settings, and Administrative Templates

You have finished a new installation. Order the steps to rename the computer and join it to a domain using the command prompt. a. Type netdom join %ComputerName% /domain:<DomainName> /userd:<UserName> /passwordd:* b. Restart the computer by typing shutdown /r c. Ensure DHCP has already configured the computers TCP/IP client d. Type netdom renamecomputer %ComputerName% /NewName: <NewComputerName>

Specify the steps number used rename the computer and join it to a domain using the command prompt. C Ensure DHCP has already configured the computers TCP/IP client. D Type netdom renamecomputer %ComputerName% /NewName: <NewComputerName> B Restart the computer by typing shutdown /r A Type netdom join %ComputerName% /domain:<DomainName> /userd:<UserName> /passwordd:*

Order the steps to install a printer in Windows Server 2012 R2. Not all steps will be used. a. Connect the print device before finishing the printer installation. b. Specify the port (or other interface) the computer will use to access the print device. c. Select the print device's specific manufacturer and model. d. Supply a printer driver specifically created for that print device. e. Load paper into the print device.

Specify the steps number used. C Select the print device's specific manufacturer and model. B Specify the port (or other interface) the computer will use to access the print device. D Supply a printer driver specifically created for that print device.

With which topology are all the devices connected to a central switch?

Star

A network administrator has been asked to configure a firewall. The firewall should allow all internal clients to access the Internet using any protocol, but should block traffic coming from the Internet unless the traffic is in response to an internal client request. What type of firewall should be used and which traffic should be blocked?

Stateful, block inbound traffic Stateful firewalls keep track of session information so they can be configured to allow inbound traffic only if it is in response to an internal client request.

Which of the following devices works with frames and MAC addresses and supports STP?

Switch Switches work with frames and MAC addresses and many of them support Spanning Tree Protocol (STP). The other devices do not.

Which of the following NIC teaming modes provides fault tolerance and bandwidth aggregation? Hyper-V live migration Switch Independent Mode Switch Dependent Mode Link Aggregation Control Protocol

Switch Independent Mode

How can you set up your new whoisthere function so that it can be run each time you log in using the Bash script?

Switch to the home directory (cd and press Enter). Edit the .bashrc or .bash_profile login script to contain the line: . ~/source/them.

How do virtual network adapters running on a child partition communicate with the parent partition?

Synthetic adapters communicate by using the VMBus; emulated adapters communicate by making calls to the hypervisor.

You have set up a new network that contains routers, switches, and WAPs. You want to be able to collect messages generated by any of these devices in a central location. Which of the following should you set up?

Syslog server Syslog is a standard for generating, storing, and processing messages about events on a device. A Syslog server is a central repository for these event messages.

Which WAN technology uses TDM, works over two copper wire pairs and transmits at 1.544 Mbps?

T-1

Which of the following is an authentication protocol that encrypts the username, authorization, and accounting information, works only over TCP, and can work with an LDAP database?

TACACS+ TACACS+ is a Cisco proprietary protocol for AAA (access, authentication, and authorization). Unlike RADIUS, TACACS+ relies on TCP at the Transport layer instead of UDP. TACACS+ can use the lightweight directory access protocol (LDAP) for user and authentication data storage and retrieval.

Which component of the Kerberos protocol allows a client to request a ticket to contact a service?

TGT

Which standard describes structured cabling?

TIA/EIA-568

What is the last part of an FQDN called?

TLD

What encapsulates IPv6 packets within User Datagram Protocol (UDP) datagrams between two registered IPv4 nodes in order to traverse IPv4 networks?

Teredo

What does the term "filter" refer to in the Windows Firewall With Advanced Security console?

The ability to display inbound or outbound rules according to a profile

What command should you usually use first when troubleshooting an interface error?

ping

Walk through the steps an administrator needs to do to prepare for an upgrade to Windows Server 2012 R2.

The administrator makes sure the server meets the minimum hardware requirements for Windows Server 2012 R2. The administrator ensures there is sufficient free disk space on the partition where the old operating system is installed. The administrator makes sure that all kernel mode software on the server including device drivers are digitally signed. The administrator also checks application compatibility. Lastly the administrator checks that everything on the server is running properly before beginning the great process. The administrator also performs a full backup.

Mike has just installed a new PC. Mike has verified the new PC's IP address and subnet mask are correct for the subnet and he can ping other devices on the subnet. However, Mike cannot ping devices on other subnets. Which of the following is most likely the problem?

The default gateway is set incorrectly. If other devices on the same subnet can be accessed, but devices on other subnets cannot be accessed, the default gateway setting is likely the problem.

If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond?

The firewall does not block client-initiated network traffic by default.

If creating a Local Group Policy Object, then a secondary GPO, then a tertiary GPO, what policy settings are included in each GPO?

The first GPO contains both Computer Configuration and User Configuration settings, while the secondary and tertiary GPOs contain only User Configuration settings.

You have just installed a router for a new LAN installation for a large internetwork that has about ten subnets and Internet access. After the installation, you test connectivity on several of the computers. You find they can all ping each other using both the computer name and the IP address, and they can ping the default gateway and devices on other subnets but none of them are able to access the Internet. All other subnets can access the Internet. What is the most likely reason for this problem?

The new router does not have a default route A default route is necessary for a router to route packets to the Internet.

After installing the Hyper-V role, what is the startup procedure for Windows Server 2012 R2?

The newly installed hypervisor starts first, then loads the operating system as the primary or parent partition

Which of the following is an attack that uses ICMP?

The ping of death attack uses the ICMP protocol.

After reviewing the routing tables of the four routers in your internetwork, you have verified that all routers have the correct information about all networks. What can you say about the routers?

The routers have converged When the routing tables in all routers in an internetwork have consistent information, the routers are said to have converged.

During DHCP lease negotiation, what happens if the client requests an IP address from the server but the server has already assigned the offered IP address?

The server responds with a DHCPNAK message to the client.

What are the exit statuses of the test command discussed in this chapter and what do they mean? How can you view the exit status results of the test command directly from the command line?

There are two exit statuses. Exit status 0 means true and exit status 1 means false. Type echo $? and press Enter to view the test command results

What are the different kinds of groups?

There are two types: security and distribution; and there are three group scopes: domain local, global, and universal.

What part of a resource record tells a server how long the record should remain in the cache?

Time to live

What is the primary reason for creating different sites on an Active Directory network?

To control the traffic passing over relatively slow and expensive WAN links between locations

Why is a differencing disk beneficial?

To maintain the parent image with no changes written to it.

You've been called to solve a workstation connectivity problem. After a brief investigation, you have identified the problem as a bad Cat 5e cable. You need to locate the cable in the wall. Which tool should you use?

Toner probe A toner probe can help locate a wire. The other tools are not typically used to locate wires.

On which layer of the OSI Model do you find both a connection-oriented and a connectionless protocol that is responsible for transporting data from one application to another?

Transport

Which of the following is associated with SNMP software? (Choose two.)

Trap MIB An SNMP trap is used to detect certain abnormal conditions and prompt the generation of SNMP trap messages. A Management Information Base (MIB) is a database used with SNMP that contains a list of objects managed by the network management system (NMS) and their descriptions as well as data about each object's performance.

You have been told to connect two switches together. Each switch has 16 ports, with 10-12 computers connected. After connecting the two switches you log on to one of the computers and attempt to ping a computer connected to the other switch. The ping is unsuccessful. You can ping other computers connected to the same switch your computer is on. Which of the following are the most likely reasons for the problem? (Choose two.)

Tx/Rx reversed Incorrect cable termination Since you are able to communicate with other computers on the same switch, the most likely reason for not being able to communicate with devices on another switch is that a straight through cable was used instead of a crossover cable (Tx/Rx reversed) or the cable was not correctly terminated.

Use two different commands to display the contents of the HOME variable

Type printenv HOME and press Enter. Also, type echo $HOME and press Enter. echo ($) prints out a variable printenv views all variables, or single ones when specified

Which port must be open on your router to allow you to upload device configuration and firmware updates using trivial file transfer protocol to your devices throughout the internetwork?

UDP 69 Trivial file transfer protocol (TFTP) operates over UDP port 69.

how shell scripts work

UNIX/Linux acts as an interpreter and compiles and executes in the same act

What tool can you use to modify a virtual hard disk?

Use Edit Virtual Hard Disk Wizard in Hyper-V Manager in Server Manager.

Modify your script from Exercise 17 so that there is a beep when the menu is ready to take the user's input.

Use the line near the end as follows: tput cup 10 9; echo -e "Select a soup ... (q) to quit \a"

What tool for creating new users is only valid while the Windows Server 2012 R2 computer is part of a workgroup and not joined to an AD DS domain?

User Accounts Control Panel

Which of the following is an advantage of client-server networks over peer-to-peer networks?

User accounts are assigned in one place

Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?

Using the Enforce, Block Policy Inheritance, or Loopback settings

If your company uses Hyper-V on Windows Server 2012 R2 and the older Virtual Server, what virtual image file format can you use on both hypervisor products?

VHD

What type of network should you deploy to allow your remote workforce to securely connect to the company network over the Internet?

VPN

Your company is using standard structuring cabling techniques. You need a spreadsheet created that tells you which switch port in the IDF each PC is plugged into. Which of the following will help you with this task? (Choose two.)

Wall Jack Labeling Patch Panel Labeling Labeling the patch panel and wall jack ports will make it easier to document which switch port each device is connected to.

You find that the wireless network has been particularly slow today, but there is very little activity from the users. You check the router logs and find that their is an unidentified address connected to the network. What type of attack are you likely experiencing?

War driving War driving is the practice of an unauthorized user using the WLAN. War drivers often drive around looking for open networks or networks using old and easily crackable security protocols.

Regarding virtual machines, what is Smart Paging used for?

When a VM has to restart and not enough memory is available to allocate its startup RAM value.

When does Windows apply Computer Configuration policies by default?

When the computer starts up

Which WAN technology uses frequencies in the 2 to 11 GHz range and can transmit and receive signals up to 50 km?

WiMAX

What is the name of the directory where Windows stores all of the operating system modules it might need to install at a later time? Windows System32 Bin WinSxS

WinSxS

Which field in a TCP segment determines how many bytes of data may be transferred before the sending computer must receive an acknowledgement from the receiving computer?

Window size

What Windows versions support the use of AppLocker polices, which poses a disadvantage compared to using software restriction policies?

Windows 7 and Windows Server 2008 R2 or later

Your company environment includes Windows Server versions 2003, 2008 (including R2) and 2012 (including R2). Desktops range from Windows XP and Vista. To transition to IPv6, what versions have IPv6 support running by default?

Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Vista.

For Server Core installations, how does Windows Server 2012 R2 differ from Windows Server 2008 when installing the AD DS role and promoting the system to a domain controller?

Windows Server 2012 R2 now allows administrators to use PowerShell

If you want users to sign on to the network from any computer to get access to network resources controlled by Active Directory, what type of network do you need?

Windows domain

Computer Configuration node security settings include several security areas. Which of the following is NOT one of them?

Wireless Network Policies (IEEE 802.3)

While working in a frequented downtown cafe with a laptop computer, the user discovers a number of shared folders that are not usually available. What is the most likely reason this user can see these folders?

Wrong SSID The user's computer probably automatically connected to an open network that does not belong to the cafe.

Do VMs ever directly access a physical hard disk?

Yes, VMs access a physical hard disk by way of a "pass-through disk", a special virtual disk that directly accesses the physical disk if it is made exclusively available to the VM.

Can a domain user, who does not possess explicit object creation permissions, create computer objects?

Yes, authenticated users can create workstation, but not server objects

Can an administrator launch the Group Policy Management console from a workstation?

Yes, if the workstation is running the Remote Server Administration Tools package

Can you modify an existing virtual hard disk (VHD) file?

Yes, you can even modify it without mounting it to a VM.

Is there a command that you can use to prevent shell variables from being assigned new values? If so, what is it?

Yes. Use the readonly command in the Bash shell.

You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing?

You can disable the setting area that is not configured for faster processing.

You need to build a virtual environment with several groups of identical OS installs. How do you accomplish this using minimal disk space?

You clone VMs using differencing disks, pointing multiple VMs to the same parent image.

You want to deploy software using Group Policy. What is necessary before assigning the software to a user account?

You must create a distribution share, also called a software distribution point. Then create the Group Policy Object, specifying how to deploy the application.

A server is running the Server Core installation of Windows Server 2012 R2. What would you do if you desired the GUI installation?

You switch to the GUI option using PowerShell commands. Fortunately, unlike with Windows Server 2008 or Windows Server 2008 R2, it is not necessary to completely reinstall Windows Server 2012 R2 to restore the GUI.

Order the steps to create a virtual disk. a. Log on with administrative privileges and open Server Manager. b. In the Virtual Disks tile, select New Virtual Disk from the Tasks menu. c. From their respective pages, select the pool in which you want to create a virtual disk and type a name for the virtual disk. d. Click Files and Storage Services > Storage Pools. e. From the Select the Storage Layout page, choose among Simple, Mirror and Parity options. f. From the Specify the Provisioning Type, choose among Thin and Fixed options. g. Specify the virtual disk size, and then click Create to confirm.

a Log on with administrative privileges and open Server Manager. d Click Files and Storage Services > Storage Pools b In the Virtual Disks tile, select New Virtual Disk from the Tasks menu c From their respective pages, select the pool in which you want to create a virtual disk and type a name for the virtual disk. f From the Specify the Provisioning Type, choose among Thin and Fixed options. e From the Select the Storage Layout page, choose among Simple, Mirror and Parity options. g Specify the virtual disk size, and then click Create to confirm.

shell function

a group of commands stored in memory and assigned a name

You are administering a print server running Windows Server 2012 R2. You want to perform maintenance on a print device physically connected to the print server. There are several documents in the print queue. You want to prevent the documents from being printed to the printer, but you don't want users to have to resubmit the documents to the printer. What is the best way to do this? a. Open the printer's Properties dialog box, select the Sharing tab, and then select the Do Not Share This Printer option. b. Open the printer's Properties dialog box and select a port that is not associated with a print device c. Open the printer's queue window, select the first document, and then select Pause from the Document window d. Open the printer's queue window, and select the Pause Printing option from the Printer menu.

a. Open the printer's Properties dialog box, select the Sharing tab, and then select the Do Not Share This Printer option.

Which of the following RAID levels yields the largest percentage of usable disk space? a. RAID 0 b. RAID 1 c. RAID 5 d. RAID 6

a. RAID 0

Which of the following are tasks that you can perform using the quotas in File Server Resource Manager but you can't perform with NTFS quotas? a. Send an email message to an administrator when users exceed their limits. b. Specify different storage limits for each user. c. Prevent users from consuming any storage space on a volume beyond their allotted limit. d. Generate warnings to users when they approach their allotted storage limit.

a. Send an email message to an administrator when users exceed their limits. b. Specify different storage limits for each user.

What is the default installation of installing Windows Server 2012 R2? a. Server Core b. Startup GUI c. PowerShell d. There is no default.

a. Server Core

The Work Folders feature in Windows Server 2012 R2 is most similar to which of the following Microsoft technologies? a. SkyDrive b. Windows Azure c. Offline Files d. Volume Shadow Copies

a. SkyDrive

Which of the following statements are true of striped volumes? a. Striped volumes provide enhanced performance over simple volumes. b. Striped volumes provide greater fault tolerance than simple volumes. c. You can extend striped volumes after creation. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

a. Striped volumes provide enhanced performance over simple volumes. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

Which step in the troubleshooting process should you take after you have established a theory of probable cause?

a. Test your theory to determine the cause

The Server Manager interface accommodates several servers, tested at nearly 100. What did the lesson highlight as an element that can easily degrade Server Manager performance, and how to resolve it? a. The Event tile generates a large number of records. It is resolved by configuring the types, ages and sources of events. b. The hardware resources of the Server Manager computer can degrade Server Manager. It is resolved by adding additional server memory. c. The server's screen resolution is set too high. It is resolved by choosing a lower resolution. d. The amount of data the server sends to all remote servers can degrade Server Manager. It is resolved by NIC teaming.

a. The Event tile generates a large number of records. It is resolved by configuring the types, ages and sources of events.

You are deciding which file system to use. You need NTFS permission system support. You don't presently need encryption or compression, but might at a later date. What file system is your best choice? a. The traditional NTFS file system b. The new ReFS file system introduced in Windows Server 2012 c. The FAT file system d. The NFS file system

a. The traditional NTFS file system

What method is available to install roles and features on another Windows Server 2012 R2 computer using Windows PowerShell? a. Use the Install-WindowsFeature command and an exported configuration file b. Use the Install-WindowsRole command and an exported configuration file c. Use Server Manager and the proper tile d. It is not possible using Windows PowerShell

a. Use the Install-WindowsFeature command and an exported configuration file

You are tempted by the advantages of Server Core, but you do not want to give up certain traditional server administration tools. What is the best option made available by Windows Server 2012 R2 as a compromise? a. Use the Minimal Server Interface b. Use PowerShell c. Use cmdlets d. Use the full graphical user interface (GUI)

a. Use the Minimal Server Interface

If massive shares were split across multiple servers, what is the best way to make them appear as a single, unified directory tree? a. Windows Server 2012 R2 Distributed File System b. Volume Shadow Copy Service c. Large volume split across multiple drives, attached to multiple servers d. Volumes created on a single Virtual Hard Disk (VHD)

a. Windows Server 2012 R2 Distributed File System

Which of the following is the best description of a security principal? a. the person granting permissions to network users b. the network resource receiving permissions c. a collection of individual special permissions d. an object that assigns permissions

b. the network resource receiving permissions

What is the primary difference between the Windows Server 2012 R2 Server Manager and previous versions? a. Windows Server 2012 R2 Server Manager allows management of multiple remote servers at once. b. Windows Server 2012 R2 Server Manager allows management of remote servers, categorized in role groups. c. Windows Server 2012 R2 Server Manager allows remote management of other servers, including down-level Windows servers. d. Windows Server 2012 R2 Server Manager has been tested with nearly 100 servers added to the interface.

a. Windows Server 2012 R2 Server Manager allows management of multiple remote servers at once.

Use a command to simulate how you would troubleshoot a problem with the sandwich script you created in Exercise 10.

e sh -x (or sh -v) sandwich

What type of policy does a new employee agree to which explains what they can and cannot do on the network?

acceptable use

In Windows Server 2012 R2, after a user logs on to Active Directory, a(an) ________ is created that identifies the user and all the user's group memberships.

access token

Which statement allows ICMP packets from any address to a server with IP address 10.1.1.1?

access-list icmp_acl permit icmp any host 10.1.1.1

Which WLAN layout should you use if you do not have an AP?

ad hoc

What are the two built-in user accounts are created on a computer running Windows Server 2012 R2?

administrator and guest

Create an alias called var that displays your environment variables.

alias var=" printenv"

What type of device can be used to mitigate the effects of attenuation?

amplifier

What can happen if a message is too large for a network segment's maximum transmission size?

an MTU black hole

What type of signals vary infinitely and appear as a wavy line when graphed over time?

analog

At which layer of the OSI model is the entire message referred to as the payload?

application

Where does a service provider's network end and the customer network begin?

at the demarc

What is the process of granting the user access only to the resources he or she is permitted to use?

authorizaition

What feature should you choose if you want a NIC to select the best link speed and duplex that is supported by a neighboring device?

auto negotiation

Which of the following updates must you install on a server running Windows Server 2008 before you can connect to it using Windows Server 2012 R2 Server Manager? a. .NET Framework 3.5 b. .NET Framework 4.0 c. Windows Management Framework 3.0 d. Windows Server 2008 R2

b. .NET Framework 4.0 c. Windows Management Framework 3.0

Which of the following is a valid IPv6 address?

b. 2001:DB8::1

What are the minimum system memory requirements to run all editions of Windows Server 2012 R2? a. 256 MB RAM b. 512 MB RAM c. 2 GB RAM d. 4 GB RAM

b. 512 MB RAM

What is the advantage of deploying roles to a virtual hard disk (VHD) file? a. Administrators can use Server Manager to modify VHD files b. An administrator can modify server roles to offline virtual machines (VMs) without starting the VM c. An administrator can modify server roles to offline VMs without connecting the VM to the network d. VHD files require fewer resources (for example, hard drive space)

b. An administrator can modify server roles to offline virtual machines (VMs) without starting the VM

Which of the following tasks must you perform before you can manage a remote server running Windows Server 2012 R2 using the Computer Management snap-in? a. Enable WinRM on the remote server. b. Enable the COM+ Network Access rule on the remote server. c. Enable the Remote Event Log Management rules on the remote server. d. Install Remote Server Administration Tools on the remote server.

b. Enable the COM+ Network Access rule on the remote server.

What key disadvantage exists for administrators in network-attached printing (local computer as print server)? a. The client computer performs the print job processing, rather than the external print server. b. Error messages appear only on the computer that originated the print job. c. There is no central way to manage the print queue, because each client has its own. d. Users can see only their own print queues.

b. Error messages appear only on the computer that originated the print job.

What is the key principle to delegating server administrative tasks? a. Granting individuals the tasks they feel most comfortable doing b. Granting individuals only the permissions needed to do the delegated job c. Assign the delegated tasks to the person most likely to benefit d. Assigning enough permissions to do the delegated tasks as well as anticipated tasks

b. Granting individuals only the permissions needed to do the delegated job

What is the next step after creating a virtual hard disk (VHD)? a. Mounting it either through Server Manager or the Disk Management snap-in b. Initializing the disk and creating volumes on it, just as you would a physical disk c. Using the VHD (creation of the VHD file readies the disk for storage) d. Mounting the VHD file to a Hyper-V virtual machine

b. Initializing the disk and creating volumes on it, just as you would a physical disk

Windows Firewall is enabled by default in Windows Server 2012 R2. How are remote management tools affected? a. Both MMC and WinRM are blocked. You must alter inbound Windows Firewall rules on the remote server. b. MMC is blocked. You must alter inbound Windows Firewall rules on the remote server. c. WinRM is blocked. You must alter inbound Windows Firewall rules on the remote server. d. Neither MMC nor WinRM are blocked.

b. MMC is blocked. You must alter inbound Windows Firewall rules on the remote server.

For a user to print, pause, resume, restart, and cancel his or her documents, the user must possess the basic _____ permission. a. Take Ownership b. Manage This Printer c. Basic Print d. Manage Documents

b. Manage This Printer

Which of the following sets of permissions is responsible for controlling access to files and folders stored on a local disk volume? a. Share permissions b. NTFS permissions c. Registry permissions d. Active Directory permissions

b. NTFS permissions

What administrative tool consolidates the controls for the printing components throughout the enterprise into a single console? a. Server Manager b. Print Management snap-in for MMC c. Control Panel d. Remote Desktop Easy Print

b. Print Management snap-in for MMC

Which of the following terms describes the software interface through which a computer communicates with a print device? a. Printer b. Print server c. Printer driver d. Print Management snap-in

b. Print server

What Windows Server 2012 R2 role would you install to provide network resources to remote users? a. Network Policy and Access Services b. Remote Access c. Windows Deployment Services d. Web Server (IIS)

b. Remote Access

What functional benefit is derived from creating server groups? a. Server groups allow administrators to add roles to several servers at once. b. Server groups allow administrators to navigate and organize several servers at once. c. Server groups allow administrators to navigate several servers at once. d. Server groups allow administrators to organize several servers at once.

b. Server groups allow administrators to navigate and organize several servers at once.

When you run Server Manager from a Windows 8.1 workstation using Remote Server Administration Tools, which of the following elements do not appear in the default display? a. The Dashboard b. The Local Server home page c. The All Servers home page d. The Welcome tile

b. The Local Server home page

On a Windows Server 2012 R2 server, you decide to change the interface. Select the best answer to convert a GUI server to Server Core. a. Reinstall the operating system and select Server Core upon installation b. Use Server Manager to start the Remove Roles and Features Wizard c. Use Server Manager to deselect the Server Graphical Shell option d. There is no option to downgrade from GUI to Server Core

b. Use Server Manager to start the Remove Roles and Features Wizard

Server Manager is properly connecting and managing your down-level servers (for example, Windows Server 2008). What tool do you use to add roles and features to the down-level server? a. Using the Add Roles and Features Wizard in Server Manager to install the role. b. Using Windows PowerShell to install the role. c. Using MMC and the applicable snap-in. d. You cannot add a role remotely to a down-level server.

b. Using Windows PowerShell to install the role.

Which of the following is a valid upgrade path to Windows Server 2012 R2? a. Windows Server 2003 Standard to Windows Server 2012 R2 Standard b. Windows Server 2008 Standard to Windows Server 2012 R2 Standard c. Windows Server 2008 R2 32-bit to Windows Server 2012 R2 64-bit d. Windows 7 Ultimate to Windows Server 2012 R2 Essentials

b. Windows Server 2008 Standard to Windows Server 2012 R2 Standard

You are deciding which Windows Server 2012 R2 edition is right for your needs: a Remote Access server. You are eager to create a virtual machine (VM) on which you can install a virtual operating system environment (VOSE). You foresee needing only one VOSE. What Windows Server 2012 R2 edition is best? a. Windows Server 2012 R2 Datacenter edition b. Windows Server 2012 R2 Standard edition c. Windows Server 2012 R2 Foundation edition d. Windows Server 2012 R2 Essentials edition

b. Windows Server 2012 R2 Standard edition

Your responsibilities include managing documents, particularly those waiting in the print queue. How does Windows Server 2012 R2 permit viewing these documents as an administrator? a. You can view documents across all print queues and print devices. b. You can view documents per print queue. c. You can view documents in the locally attached print device. d. You can view documents using only the associated PowerShell cmdlet.

b. You can view documents per print queue.

Which of the following are not true in reference to converting a basic disk to a dynamic disk? a. You cannot convert a basic disk to a dynamic disk if you need to dual boot the computer. b. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes. c. A boot partition or system partition on a basic disk cannot be extended into a striped or spanned volume, even if you convert the disk to a dynamic disk. d. The conversion will fail if the hard drive does not have at least 1 MB of free space at the end of the disk.

b. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes.

Which of the following terms describes the process of granting users access to file server shares by reading their permissions? a. authentication b. authorization c. enumeration d. assignment

b. authorization

In the NTFS permission system, combinations of advanced permissions are also known as __________ permissions. a. special b. basic c. share d. standard

b. basic d. standard

Which of the following is most likely to use fiber-optic cabling?

backbone wiring

dump [-options] devicename and partition or filename

backs up files and directories uses 9 levels, 0: all files 1: all files since last bu, 2: since all level 1, and so on

Set your shell from the command line to be the Bash shell. Then, use the echo command to verify the contents of the shell variable. What is now contained in the shell variable?

bash echo $SHELL

What type of malware runs in the place of the computer's normal system files when the computer starts?

boot sector virus

Which type of router connects an autonomous system to an outside network?

border routers

What type of transmission technology carries multiple signals on a single media and is used for cable Internet service?

broadband

If you experience a temporary dimming of lights, what have you experienced?

brownout

Order the steps to create a storage pool. Not all steps will be used. a. Confirm selection and close the wizard. b. In the Storage Pools tile, select the primordial space on the server where you want to create the pool. From the Tasks menu, select New Storage Pool. c. Log on with administrative privileges and open Server Manager. d. In the New Storage Pool Wizard, specify a storage pool name and subsystem. e. Click Files and Storage Services > Storage Pools. f. Specify a name, server, and physical disks for the pool.

c Log on with administrative privileges and open Server Manager. e Click Files and Storage Services > Storage Pools. b In the Storage Pools tile, select the primordial space on the server where you want to create the pool. From the Tasks menu, select New Storage Pool. d In the New Storage Pool Wizard, specify a storage pool name and subsystem. f Specify a name, server and physical disks for the pool. a Confirm selection and close the wizard.

What are the most common frequencies used on Wi-Fi networks?

c. 2.4 GHz, 5 GHz

What is the maximum number of shadow copies that a Windows Server 2012 R2 system can maintain for each volume? a. 8 b. 16 c. 64 d. 128

c. 64

By default, Server Manager does not connect with down-level servers (for example, Windows Server 2008). What must be done to properly connect? a. Remotely manage the down-level server by MMC. b. Disable the Windows Firewall on the down-level server. c. Add WinRM 3.0 support by installing the necessary updates and hotfix. d. Perform in-place upgrades to Windows Server 2012 R2 to all Windows Server 2008 R2 or lower-level servers.

c. Add WinRM 3.0 support by installing the necessary updates and hotfix.

Before you can deploy roles to multiple remote servers, what must be done? a. Perform an in-place upgrade to Windows Server 2012 R2. b. Ensure the remote servers are patched sufficiently. c. Add the remote servers to the Server Manager interface. d. Perform a full backup

c. Add the remote servers to the Server Manager interface.

Save and test the revised phmenu.1 file using the groff and man programs.

groff -Tascii -man ./phmneu.1 | more man ./phmenu.1

What is a key reason for assigning permissions when configuring file and share access? a. Creates redundancy for file storage, providing a fault-tolerant file archive. b. Enables configuring offline files, improving performance. c. Improves data security, granting file and share access only to the users who need it. d. Assigns ownership to specific users, instilling responsibility and personal accountability.

c. Improves data security, granting file and share access only to the users who need it.

Which of the following volume types supported by Windows Server 2012 R2 do not provide fault tolerance? (Choose all that apply) a. Striped b. Spanned c. Mirrored d. RAID-5

c. Mirrored d. RAID-5

You are setting up a printer pool on a computer running Windows Server 2012 R2. The printer pool contains three print devices, all identical. You open the Properties dialog box for the printer and select the Enable Printer Pooling option on the Ports tab. What must you do next? a. Configure the LPT1 port to support three printers. b. Select or create the ports mapped to the three printers c. On the Device Settings tab, configure the installable options to support two additional print devices. d. On the Advanced tab, configure the priority for each print device so that printing is distributed among the three print devices.

c. On the Device Settings tab, configure the installable options to support two additional print devices.

Your company wants to upgrade to Windows Server 2012 R2. Considering the present environment of mostly Windows Server 2008 R2 servers, what is the best path to upgrade to Windows Server 2012 R2? a. Perform an in-place upgrade of a Windows Server 2008 R2 machine b. Create a virtual instance of Windows Server 2012 R2 c. Perform a clean installation of Windows Server 2012 R2 d. Perform an in-place upgrade of the current lowest Windows Server edition

c. Perform a clean installation of Windows Server 2012 R2

A JBOD drive array is an alternative to which of the following? a. SAN b. SCSI c. RAID d. iSCSI

c. RAID

Concerning storage solutions, select the disk configuration that offers the most protection in case of drive failure. a. RAID 0 b. RAID 1 c. RAID 5 d. Large volume on a single drive

c. RAID 5

You are administering a computer running Windows Server 2012 R2 configured as a print server. Users in the Marketing group complain that they cannot print documents using a printer on the server. You view the permissions in the printer's properties. The Marketing group is allowed Manage Documents permission. Why can't the users print to the printer? a. The Everyone group must be granted the Manage Documents permission. b. The Administrators group must be granted the Manage Printers permission. c. The Marketing group must be granted the Print permission. d. The Marketing group must be granted the Manage Printers permission.

c. The Marketing group must be granted the Print permission.

The security configuration of the Windows PowerShell Web Access Gateway server is crucial, employing a security certificate from a trusted certification authority and user-specific authorization rules. Why are these security measures so crucial? a. There is often both client and server side security, but only server end measures are controlled. b. There is no mandatory security on the client side of the application, relying more on server side security. c. There is no security on the client side of the application, instead relying on robust server side security. d. There is often both client and server side security, but only client end measures are controlled.

c. There is no security on the client side of the application, instead relying on robust server side security.

What is the purpose of Microsoft releasing multiple editions of Windows Server 2012 R2? a. To better secure a server by eliminating unnecessary features b. To accommodate needs of different companies c. To offer various feature sets and at different price points d. To complement available 32-bit server editions

c. To offer various feature sets and at different price points

Windows Server 2012 R2 provides hardware-independent NIC teaming or bonding to enable better network performance and adapter fault-tolerance. However, in what scenario is the NIC teaming limited? a. During a Hyper-V live migration b. When network adapters connect to different switches c. When network traffic consists of large TCP sequences d. For multiple network adapters to function as one interface

c. When network traffic consists of large TCP sequences

What utility allows you to install components to multiple servers at once? a. The Add Roles and Features Wizard only b. Both Add Roles and Features Wizard and Windows PowerShell c. Windows PowerShell only d. The Minimal Server Interface

c. Windows PowerShell only

Active Directory Rights Management Services (AD RMS) are available on which Windows Server 2012 R2 edition? a. Windows Server 2012 R2 Datacenter edition b. Windows Server 2012 R2 Datacenter and Standard editions c. Windows Server 2012 R2 Datacenter, Standard, and Foundation editions d. All Windows Server 2012 R2 editions

c. Windows Server 2012 R2 Datacenter, Standard, and Foundation editions

After performing Exercise 3, use the test command to evaluate whether the shell variable contains a reference to the bash shell and use the echo command to determine the result. (Note that this provides one way to verify from within a script that the script user is set up to use the Bash shell.).

e test $SHELL = "/bin/bash" echo $?

To use Shadow Copies, you must enable the feature at which of the following levels? a. the file level b. the folder level c. the volume level

c. the volume level

tput [-option] argument

can be used to initialize the terinal or terminal window display, position text and the cursor

Display the contents of .bashrc file. Next, use the vi editor to edit that file and put in an alias so that every time you type list you see a long file listing of a directory.

cd more .bashrc use vi or Emacs to place the line alias list="ls -l" under the # User specific aliases and functions section in the file.

Change back to your home directory, if you are not in it. Use the set command to set up your working environment to prevent you from overwriting a file

cd set -o noclobber

Make certain that your home directory is your current working directory. Use the command to verify that your source directory exists. How might knowledge of this command be useful when you create scripts for yourself or others?

cd test -d source echo $?

Make your home directory your current working directory. Use the vi or Emacs editor to open the veg_choice script you created in Chapter 6. Enter a line in that script to ensure the script uses the Bash shell. Run veg_choice to ensure your change works properly.

cd vi veg_choice #!/bin/bash >> insert at top

Switch to your source directory. Display the contents of the PATH variable. Next, use the command to add your current working directory to the PATH variable.

cd source echo $PATH [or] printenv PATH PATH=$PATH:.

List the records in the corp_phones_bak file that you created earlier, so that they are displayed without colons separating the fields, but have one space between fields instead.

cd ~/source cat corp_phones_bak | tr ":" " "

Use a one line command to strip out the telephone prefix (219-) and the colons in the corp_phones_bak file and save the result in a file called noprefix?

cd ~/source cat corp_phones_bak | tr -d : | tr -d 219- > noprefix

Switch to your source directory and make a copy of the corp_phones file (which will give you a valuable backup of the corp_phones file) with the name corp_phones_bak. Using the tr command as a filter for output from another command, display to the screen the contents of corp_phones_bak so that all capitalized letters from A to M are lowercase.

cd ~/source cp corp_phones corp_phones_bak cat corp_phones_bak | tr [A-M] [a-m]

In your source directory, write a script called "them" in which you create a function called thethat displays a listing of who is logged in and displays the column headings for the information displayed.

cd ~/source vi them whoisthere() { who -H }

Edit the veg_choice script again, but this time change the line: if [ "$veg_name" = "carrots" ] to use the test command.

change the line to: if test $veg_name = "carrots" a

sh [-options] [shell script name]

checks for bugs

ispell [-options] filenames

checks spelling in files and suggests changes -b creates .bak -C ignores concatenated words -D orders suggest spelling from most to least likesly

sh -n

checks syntax of a shell script but doesn't execute

What is the term for a block of data that has been transformed by an encryption algorithm?

ciphertext

On a fiber-optic cable, what surrounds the light-carrying fibers that reflects light back into the middle of the fiber?

cladding

tput clear

clears the screen

You have just installed a SOHO AP for a new Wi-Fi network that services about 35 Wi-Fi clients. All client devices are having intermittent connection problems and connections are slow. What is a likely cause of the problem?

client saturation

Use the cmp command to compare the famous_words and famous_words.bak files.

cmp famous_words famous_words.bak

sequential logic

commands are executed in the order in which the appear in the script or program

Which cloud computing deployment model shares a service among multiple organizations but is not available to the public?

community cloud

test -nt

compares first file in arg w second to see if first is newer

test -ot

compares first file in arg w second to see if first is older

cmp [-options] file1 file2

compares two files and indicates if they are different

test -eq

compares two integers to determine if they are equal

Regarding security templates, a strategy plan should consider ______.

computer roles

What type of 802.11 frame is used for media access and includes RTS frames?

control frames

dd [option]

copies an input file and can convert the file's contents to another format or to have different characteristics

What type of noise occurs when a signal traveling on one wire infringes on the signal traveling on an adjacent wire?

cross-talk

What type of cable do you need to connect two switches together when neither switch has an autosense function?

crossover

What is a key advantage of Server Manager over the Disk Management snap-in? a. The Server Manager now offers disk-related functions from the navigational pane. b. Server Manager is more user-friendly. c. The Disk Management snap-in enables you to create VHD files and mount them on the computer. d. Server Manager can perform many of the same functions for servers all over the network.

d. Server Manager can perform many of the same functions for servers all over the network.

What type of device should you consider for a network that frequently experiences total blackouts for long periods of time?

generator

Order the steps to create and mount a VHD. a. Select the virtual hard disk format option (VHD or VHDX). b. Select one of the following VHD types (Fixed size or Dynamically expanding). c. Click OK for the system to create and attach the VHD file. The VHD appears as a disk in the Disk Management snap-in. d. Log on with administrative privileges and open Server Manager. e. Click Tools > Computer Management. f. Specify the Location path and name for the new VHD file, and then specify the maximum size of the disk. g. Click Disk Management, and then click Create VHD from the Action menu.

d Log on with administrative privileges and open Server Manager. e Click Tools > Computer Management. g Click Disk Management, and then click Create VHD from the Action menu. f Specify the Location path and name for the new VHD file, and then specify the maximum size of the disk. a Select the virtual hard disk format option (VHD or VHDX). b Select one of the following VHD types (Fixed size or Dynamically expanding). c Click OK for the system to create and attach the VHD file. The VHD appears as a disk in the Disk Management snap-in.

Which of the following statements about permissions are true? a. ACLs are composed of ACEs. b. Basic permissions are composed of advanced permissions. c. All permissions are stored as part of the protected resource. d. All of the above.

d. All of the above.

How can you remotely configure the firewall on several servers at once? a. Using the PowerShell command Set-NetFirewallRule -name -enabled All b. Applying the configuration change to the applicable server grouping in Server Manager c. Creating a configuration file for junior administrators to configure servers in parallel d. Applying a Group Policy related to Windows Firewall to the servers

d. Applying a Group Policy related to Windows Firewall to the servers

What printing configuration makes the computer with the locally attached print device function as a print server? a. Network-attached printer sharing b. Network-attached printing c. Locally attached printer sharing d. Direct printing

d. Direct printing

Knowing how permissions can be cumulative or override each other is an important factor in understanding what? a. Permission inheritance b. Explicitly assigned permissions c. Permission precedence d. Effective access

d. Effective access

Which of the following statements is not true in reference to resource ownership? a. One of the purposes for file and folder ownership is to calculate disk quotas. b. Every file and folder on an NTFS driver has an owner. c. It is possible for any user possessing the Take Ownership special permission to assume the ownership of a file or folder. d. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one at all, including the owner of the file or folder.

d. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one at all, including the owner of the file or folder.

Which of the following are not true about differences between network attached storage (NAS) devices and storage area network (SAN) devices? a. NAS devices provide a file system implementation; SAN devices do not . b. NAS devices must have their own processor and memory hardware; SAN devices do not require these components c. NAS devices require a specialized protocol, such as Fibre Channel or iSCSI; SAN devices use standard networking protocols. d. NAS devices must run their own operating system and typically provide a web interface for administrative access; SAN devices do not have to have either one.

d. NAS devices must run their own operating system and typically provide a web interface for administrative access; SAN devices do not have to have either one.

Which of the four fundamental printer configurations is the best printer deployment for a company of many users requiring the use of a few printers? a. Direct printing b. Locally attached printer sharing c. Network-attached printing d. Network-attached printer sharing

d. Network-attached printer sharing

Can you install 32-bit print drivers on a Windows Server 2012 R2 system? a. No, because Windows Server 2012 R2 is a 64-bit platform. b. Yes, because Windows Server 2012 R2 is a 64-bit platform, which comes with 32-bit support. c. No, but you can install the 32-bit driver through Server Manager. d. No, but you can install the 32-bit driver from a computer running a 32-bit version of Windows.

d. No, but you can install the 32-bit driver from a computer running a 32-bit version of Windows.

One of your print devices is not working properly, and you want to temporarily prevent users from sending jobs to the printer serving that device. What should you do? a. Stop sharing the printer b. Remove the printer from Active Directory c. Change the printer port d. Rename the share

d. Rename the share

What happens if you attempt to add workgroup servers to Server Manager? a. Server Manager allows only servers that are members of an Active Directory Domain Services (AD DS) domain to be managed. b. Server Manager adds and allows management of any computer, whether a member of an AD DS domain or workgroup. c. Server Manager will not permit workgroup servers to be added and managed. d. Server Manager usually allows you to add workgroup servers, but attempts to access the remote server fail with a "Credentials not valid" error.

d. Server Manager usually allows you to add workgroup servers, but attempts to access the remote server fail with a "Credentials not valid" error.

Name the two methods to assign a static IP address to a computer using Server Core. a. Server Manager and the netdom.exe command b. The netdom.exe command and the IPv4 Properties sheet c. The IPv4 Properties sheet and the netsh.exe command d. The netsh.exe command and the New-NetIPAddress cmdlet provided by Windows PowerShell

d. The netsh.exe command and the New-NetIPAddress cmdlet provided by Windows PowerShell

As an administrator of a Windows Server 2012 R2 network, you want to add a role to a few servers on the network. What is your best available option? a. Install a role at the target server's console b. Use Server Manager on the nearest computer running Windows Server 2012 R2 c. Connect to the target server using Remote Desktop Services d. Using PowerShell, install the desired role to all target servers at once

d. Using PowerShell, install the desired role to all target servers at once

Which of the following Windows Server 2012 R2 features enables users to access files that they have accidentally overwritten? a. Offline Files b. parity-based RAID c. Windows Installer 4.0 d. Volume Shadow Copies

d. Volume Shadow Copies

PowerShell Web Access Gateway allows _______. a. users to remotely connect to their desktops. b. administrators to remotely manage IIS servers. c. users a command-line alternative to standard websites. d. administrators remote management of servers using commands.

d. administrators remote management of servers using commands.

When planning for additional disk space for the print server spooler, consider extra storage for ______. a. overhead in case of several smaller print jobs b. the print server page file c. older, less efficient print drivers d. temporary print device outages

d. temporary print device outages

At what layer of the OSI model do SLIP and PPP operate?

data link

What is the highest layer of the OSI model at which NICs operate?

data link

dd if

designates the input file

dd of

designates the output file

test -!

determines if an expression is fales

test -r

determines if file has read permission

test -w

determines if file has write permissions

test -x

determines if file is executable

test -s

determines if file is not empty

test stringa = stringb

determines if two strings are eyal

Use the df command to view file system use in megabytes.

df -m

Which of the following is a small file that contains a user's public key and identifying information?

digital certificate

uptime

displays how long the system has been up since the last boot

df [-options] [filesystems]

displays how space in a disk is allocated, used and free -h human readable -l only local -m size in mb -t only type of file system

sh -v

displays lines of code whule executing a shell script

sh -x

displays the command and arguments as a shell script is run

What are the last two parts of a FQDN called?

domain name

What type of routing ensures that the routing table is updated when a router is added to the network?

dynamic

Create a script that uses case logic to have someone guess your favorite sandwich, such as tuna.

echo -n "Guess my favorite sandwich: " read guess case "$guess" in "tuna") echo "Tuna is my favorite sandwich" ;; * ) echo "Nope, actually I like tuna" ;; esac

Sometimes called a legacy adapter, the _______ is a standard network adapter driver that communicates with the parent partition by making calls directly to the hypervisor.

emulated network adapter

What should you do if WLAN clients complain that their devices cannot find the wireless network?

enable SSID broadcasts

mail [-options] [username]

enables you to send/get mail through computer or server

bold=`tput smso` offbold=`tput rmso`

enables/disables boldface

to reference a variable

enclose in {} or precede with $

What Wi-Fi security threat uses a rogue access point with a legitimate-sounding SSID?

evil twin

decision logic

execute statement(s) according to certain conditions (if then, else)

export -n export -p

export -n: undoes export export -p: lists exported variables

Make the s variable you assigned in Exercise 2 an environment variable and use the command to verify it is recognized as an environment variable

export s printenv/ printenv s (shows that s is an env var)

Local GPOs contain fewer options than domain GPOs. Local GPOs do not support ______.

folder redirection or Group Policy software installation

looping logic

for loops

At the command line use a for loop that uses the variable sandwiches and then displays a line at a time the following sandwiches: chicken, ham, hummus, tomato.

for sandwiches in chicken ham hummus tomato do echo $sandwhiches done

An Active Directory _____ consists of one or more separate domain trees.

forest

Use the command that gives you information about swap space and memory use.

free

csh/tcsh

from C shell

Bash Shell

from bourne and korn

ksh/zsh

from korn shell

Members of a universal group can come ______.

from trusted forests

What type of communication method is most like talking on a telephone?

full-duplex

top [options]

monitors CPU intensive stacks (doesn't need - for options) d: delay between screen updates p: monitors process w specified process id q: causes the top utility to refresh wo delay s: secure mode S: cumulative mode n: specifies how many times to update b: batch update (must also use w n) i: ignores any idle processes c: displays the command line instead of teh command name only

netstat [-options] host

monitors network traffic on host computer -a diplays stats for ports used by transport protocol -p shows programs in use related to active ports -n displays communications via ip and port numbers -s shows all stats

Which of the following describes the ability of a cloud computing provider to host many services for many users on only a few servers?

multi-tenant model

What capability allows you to create specific GPO settings for one or more local users configured on a workstation?

multiple local GPOs

alias [-options] [name = "command"]

name that represents another command alias -p: prints all aliases

Which command displays the lmhosts file?

nbstat -n

What is the process by which routers learn about all of the devices on their network?

neighbor discovery

Which troubleshooting tool should you use if you want to see details about TCP connections on a host?

netstat

Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify?

network bits

Which of the following is a benefit of fiber-optic cable over copper cabling?

noise immunity

When deploying NAC, what should you install on a system to get a one-time posture assessment of that system?

non persistent agent

What is required to prepare applications with an approval stamp from Microsoft on its packaging, including the Certified for Windows Server 2012 R2 logo, for Windows Installer?

nothing-the application is Windows Installer-enabled

What command should you use to determine the FQDN of a computer with IP address 172.31.209.5?

nslookup 172.31.209.5

What is the primary benefit of the IPv6 address space over the IPv4 address space?

number of possible hosts and networks

exit status (test)

numeric value that the command returns to the os when finished test: 0=true 1=false

What process allows a network technician to install an application onto a user's mobile device to give the device trusted access to certain portions of the network?

on-boarding

Within a domain, the primary hierarchical building block is the _________.

organizational unit

Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system?

path

In general terms, there are three ways a computer receives an IPv4 or IPv6 address. Which of the following is NOT one of them?

peer allocation

In which type of network does each computer control its own resources and communicate directly with other computers?

peer to peer

let [expression with operators]

performs a given action on numbers that is specified by operators, and value is stored in a shell var PEMDAS

A user receives a fraudulent email claiming to need his user name and password to confirm his online bank account. What type of attack has been attempted?

phishing

If you are connected to a network, use the ping command to ping one or both of the addresses you obtained in Exercise 8. Also, if you have access to an Internet connection, use the ping command to ping the GNOME Web site, using ping gnome.com (or use another site provided by your instructor).

ping [ip address] ping 127.0.0.1 ping gnome.com

You want to find out if the TCP/IP services are working correctly on the computer you are working on. Which command should you use?

ping localhost

What type of cabling should you use in the area above the ceiling or below the subflooring?

plenum-rated

What type of malware can change its characteristics each time it is transferred to a new system?

polymorphic virus

What technique might an IDS use so that it can monitor all traffic carried by a switch?

port mirroring

You can configure the Windows Firewall to allow or block specific _________.

ports, protocols, applications, users, and IP address ranges

tput cup

positions cursor and text on screen tput cup 0 0 : moves cursor to row 0, column 0, upper left corner

What process is a thorough examination of a network's vulnerabilities that every organization should conduct to assess its security risks?

posture assesment

Which part of an Ethernet II frame signals to a receiving node that bytes of a frame are coming?

preamble

printenv [-option] [variable name]

prints a listing of environment and configuration variables specifies one or more vars as arguments to view info only about thos

tput cols

prints number of columns for the current terminal display

Which type of encryption uses the same key to encrypt and decrypt a message?

private key

ps [-options]

provides a listing of the currently running processes -A or -e shows all processes selected on the specified command na,e -p PID shows processes selected on the PID -l PID shows a long listing of information about processes l PID (longer than -l PID)

free [-options]

provides stats about free and used memory -b displays in bytes -m displays in mb -g in gb -s n continuous (ctrl c to end) -t creates totals for RAM and swap mem statistics

Log out of root and back in to your own account. Type the command to determine the PID of your Bash shell session and record the PID.

ps

Use the command to determine which users have processes running on your system.

ps -Au

How would you configure the system so that an application will create a shortcut in the Start menu on a user's workstation and when the user clicks the shortcut, the actual installation is performed?

publish an application to a user

Which of the following is NOT a property of analog signals?

pulse of 0 or 1

In a NAC-protected network, where should a device that does not meet compliance requirements be placed?

quarantine network

What type of power converter converts AC power to DC power?

rectifier

The typical query one DNS server sends to a root name server is called a(n) _______.

recursive query

restore [-options] device partition or filename

restores entire filesystems, specific files, and directories -f device or -file specifies device or file -i runs in interactive mode -N shows file names and directories on the backup medium -r restores a file system -x specifies certain files or directories to be restored

Which topology is most likely to use a token?

ring

What device do you need if your network has multiple LANs that need to communicate with each other?

router

In the Windows Firewall With Advanced Security console, while creating a new rule, the Program page specifies whether the ______.

rule applies to all programs, to one specific program, or to a specific service

login script

runs after you log in

What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rule applies?

scope

What can a company that is accredited by an agency that sets security standards perform for your network?

security audit

What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?

security filtering

Of the default groups created when Active Directory is installed, what are the types of those groups?

security groups

shell logic structures

sequential logic decision logic looping logic case logic

set -a set -n set -o, set -o noclobber set -u set -v

set -a: exports all vars after defined set -n: takes commands w/o executing them set-o: sets a particular shell mode set -o noclobber: prevents files from being overwritten by the > operator set -u: shows an error when there is an attempt to use an undefined operator set -v: displays command lines as they are they are executed

why exporting

shell scripts can't automatically access variables created by other scripts, so exporting them gives them global meaning so that it's viewed by all scripts as an environment var

What command should you enter to see the routing table on a Cisco router?

show ip route

What should you do before placing access points for a new WLAN?

site survey


Conjuntos de estudio relacionados

Unit 3 - Nursing Process, Nursing Process Practice Questions, Chapter 2. Critical Thinking & the Nursing Process, Chapter 3. Nursing Process: Assessment, Chapter 5. Nursing Process: Planning Outcomes, Chapter 6. Nursing Process: Planning Intervention...

View Set

Apex Learning 2.3.2 Quiz Career and College Prep

View Set

Ivy Tech Online Biology: Session 7

View Set

Doing social psychology research 2

View Set