Exam 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You need to install a 32-bit application on a 32-bit version of Windows 10. Where is the default directory where the application will be installed?

%systemdrive%\Program Files

You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed?

%systemdrive%\Program Files (x86)

Which of the following files extension types can be run from the command prompt?

.com .bat .exe

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi

Which of the following file extensions indicates a Windows system file? (Select two)

.vxd .dll

Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

Which of the following are true of Libraries? (Select two.)

1.)A single folder can be added to multiple Libraries. 2.)Each can contain multiple folders from different file system locations.

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?

100 meters

Which type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km?

10GBaseER single-mode

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

You have a computer with an onboard LAN adapter. The LAN adapter has failed and you are unable to connect the computer to the network. What should you do?

Add a network card using a PCI slot.

What does the following command do? attrib +s +r -a myfile.dll

Adds the system file attribute, adds the read-only attribute, and removes the archive attribute to the file myfile.dll

You computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports -Copy Costs.doc from C:\Confidential to C:\PublicReports What permissions do members of the Users group have to these two files in the C:\PublicReports folder?

Allow Full Control to both

You manage two folders in your computer as follows: -C:\Confidential -C:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permissions to the User groups: -Reports.doc -Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports folder?

Allow Full Control to both

Which file attribute identifies the file as having been modified since the last backup?

Archive

Which of the following is a rating of the amount of data that can be sent over a network in a period of time?

Bandwidth Explanation

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

Can be used to connect wireless clients to wired clients on the same network.

Bridge

Which of the following statements are true regarding administrative shares?

By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E

You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path? (Select two.)

C:\User\username\AppData\Local\Temp %tmp%

Where system root is the C: drive, what is the path to the system files that hold user profiles in Windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

Where system root is the C: drive, Where are fonts stored on Windows 7 system?

C:\Windows\Fonts

What type of cabling can be used for an Ethernet 100Base-T (100 Mbps) network?

Category 5e UTP Category 5 UTP

What type of cable configuration is shown here and what is it used for?

Crossover cable configuration. Used to connect computers directly to one another for networking.

The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: -Allow Full Control to the D:\Reports folder -Deny Full Control to the D:\Sales folder -Deny Full Control to the D:\Reports\2010reports.doc file -Allow Full Control to the D:\Sales\2010sales.doc file What effective permissions does Mary have to both files?

Deny Full Control to both

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to C:\Public Reports. -Copy Costs.doc from C:\Confidential to C:\PublicReports. What permissions do members of the Users group have to these two files in the C:\PublicReports folder?

Deny Read to the Reports.doc; Allow Full Control to costs.doc

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings?

Domain Directory

The D:\ drive in your computer has been formatted with NTFS. The Sales group on you computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the properties for the file; assign Mary the Deny Full Control permission.

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-Type

Which network type uses light pulses to transmit data?

Fiber optic

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access?

File Explorer This PC Network

If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set any security permissions on the folder?

Full Control

What is a major benefit of STP over UTP?

Greater resistance to interference.

You are using a crimper to attach an RJ-45 connector to a Cat UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?

Green with white

Connects segments on the same subnet. Repeats signals out to all other ports.

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling?

Immunity to electromagnetic interference. Greater cable distances without a repeater.

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder. What should you do?

Include the D:\Reports folder in the Library.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file; when you type you want the existing text that comes after the cursor to be pushed down? What mode do you need to be in to do this?

Insert Mode

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

Which of the following statements accurately describes how a modem works?

It demodulates analogue data from a telephone network into digital PC data. It modulates digital data from the PC into analogue data and transmits it on a telephone network.

Which of the following are characteristics of coaxial network cable?

It has a conductor made from copper in the center of the cable. It uses two concentric metallic conductors.

A network in a small geographic area that typically uses wires to connect systems together.

Local Area Network (LAN)

A set of subnets connected to each other, typically by wires, using at least one router.

Local Area Network (LAN)

Susan in accounting has left the company and been replaced my Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will most likely correct the problem?

Make Manuel the owner of the file.

You have implemented an ad-hoc wireless network that doesn't employ a wireless access pint. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of networks?

Mesh

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

A network that is typically owned and managed by a city as a public utility.

Metropolitan Area Network (MAN)

A network that covers an area as small as a few city blocks to as large as an entire city.

Metropolitan Area Network (MAN).

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?

Modify the NTFS permissions on the folder.

Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?

Modify the permissions on the document.

At distance of under 2 km, delivers data rates up to 1 Gbps.

Multimode

Cable lengths are limited in distance

Multimode

Data transfers through the core using more than one light rays.

Multimode

A medical center wants to upgrade their network backbone to 10 Gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on site storage area network (SAN) without bogging down the network. Some of the backbone segments will have to reach between buildings that are close to 300 meters apart. Which of the following cable types will support 10 Gigabit Ethernet at the necessary segments lengths while keeping costs as low as possible?

Multimode fibre optic

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network interface card

You manage two folders in your computer as follows: -C:\Confidential -C:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports foler?

Permissions are removed from both files

A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless-printer, and a smartphone.

Personal Area Network (PAN).

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do?

Place the files on an NTFS partition. Configure both share and NTFS permissions.

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?

Plenum

You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode?

Press Insert, then press Insert again. Press the 'i' key, then press Insert. Press the 's' key, then press Insert.

You have a file which you would like others users to see, but not modify. which file attribute should you use?

R

Which kind of connector do you use to connect a modem to a standard telephone line?

RJ-11

Which connector is used with unshielded twisted pair (UTP) cable?

RJ-45

Connects two network segments that have different subnet addresses.

Router

Which of the following are advantages of using a domain to manage a network?

Scalability Centralized administration.

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8.

At distance up to 3 km, delivers data rates up to 10 Gbps.

Single mode

Cable lengths can extend a great distance.

Single mode

The core diameter is around 10 microns.

Single mode

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

Which of the following topologies connects each network device to a central hub?

Star

Connects segments on the same subnet. Forwards signals to only the port connected to the destination device.

Switch

What device is used to create a physical star topology?

Switch

Which of the following LAN devices receives a signal on one port, and forwards that signal only to the port where the destination device is connected?

Switch

Which of the following is true of a network using the 1000Base-T standard?

The network uses copper UTP cables. The network operates at one gigabit per second.

Which of the following situations is more likely to justify the investment in Category 6a cable instead of Category 6?

The work area has a lot of electromagnetic interference (EMI).

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header.

A group of networks that are geographically isolated, but are connected to form a large internetwork.

Wide Area Network (WAN)

Similar to a standard LAN, but uses radio signals instead of wires to connect systems together.

Wireless Local Area Network (WLAN)

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Workgroup Peer-to-peer

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use?

\\Home1\Pictures

You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. which command would you use?

attrib +r -h

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo

Which command would you use to change the current directory to the immediate parent directory?

cd ..

Which command will display a list of files and subdirectories in a directory?

dir

You find that someone has set up an unauthorized account, with the username badmin, on the Linux server. You have disabled the account but you need to find out when and how this user has been gaining access to the system. The first step you decide to take is to inspect the contents of the /var/log/auth.log file to find information related to badmin logging into the system. Which command can you use to search through the auth.log for lines that contain the username you're looking for?

grep "badmin" /var/log/auth.log

Which commands can you use to create a new directory? (Select two)

mkdir md

You need to view the contents of /var/log/auth.log file to get information about the users that have been logging on to the system. The auth.log file is a plain text file so you decide to use the cat command to review the file. However, the display fills up with text for several pages and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page?

more /var/log/auth.log less /var/log/auth.log

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions?

net use

How can you see a list of valid commands parameters for the net use command?

net use /?

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes.

robocopy

You are the administrator of a Linux server. Following best practices for system security and effective administration, you always login to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Which command would you use to copy all files in a directory, including all subdirectories, including empty subdirectories?

xcopy /e


Kaugnay na mga set ng pag-aaral

Chapter 16 Darwin's Theory of Evolution

View Set

Chapter 01: Assignment: The World of Innovative Management

View Set

N204 Practice Quizes, Fundamentals Quiz, Health and Physical Assessment, Leadership EAQ's, EAQ NCLEX, Maternity Chap 28, Maternity and Women's Health Nursing - Newborn, Nur 106- Module G2, Pediatric Growth & Development EAQ, Nursing Sciences EAQ, The...

View Set

Rheumatic Disorders (RA, SLE, Gout, Fibromyalgia etc.)

View Set

VATI: Fundamentals - Pre-Assessment Quiz

View Set