CSC550 Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following actions typically involve the use of 802.1x authentication? (Select two.) Controlling access through a router. Authenticating remote access clients. Controlling access through a switch. Controlling access through a wireless access point. Authenticating VPN users through the internet.

Controlling access through a switch. Controlling access through a wireless access point.

You are traveling throughout North America to many metropolitan and rural areas. Which single form of internet connectivity provides the greatest potential connectivity wherever you travel? PSTN ISDN DSL Broadband cable

PSTN

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patients' statistical data to a central database via the internet that ensures network connectivity for any clinic located anywhere in the world, even remote areas? Cable modem Satellite Dial-up ISDN DSL

Satellite

A user reports that she can't connect to the internet. After some investigation, you find that the wireless router has been misconfigured. You're responsible for managing and maintaining the wireless access point. What should you do next? Document the problem. Fix the problem. Create an action plan. Determine if escalation is needed.

Create an action plan.

What is WindowsUpdate.log? A log file that analyzes Windows Update Service, BITS, and Windows Network Diagnostics Service. A log file that allows you to see enforced policies on your Windows 10 machine. A log file you can create and save in order to locate errors or problems. A log file that deploys updates to device groups over a deployment timeline.

A log file you can create and save in order to locate errors or problems.

What is the primary purpose of RADIUS? Manage RAID fault-tolerant drive configurations. Manage access to a network over a VPN. Control entry-gate access using proximity sensors. Authenticate remote clients before access to the network is granted.

Authenticate remote clients before access to the network is granted.

For users on your network, you want to automatically lock user accounts if four incorrect passwords are used within 10 minutes. What should you do? Configure account expiration in user accounts Configure password policies in Group Policy Configure account lockout policies in Group Policy Configure day/time restrictions in user accounts Configure the enable/disable feature in user accounts

Configure account lockout policies in Group Policy

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next? Create an action plan. Establish the most probable cause. Identify the affected areas of the network. Determine what has changed.

Determine what has changed.

Which IPSec subprotocol provides data encryption? SSL AH AES ESP

ESP

Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take? Review company websites to see which type of sensitive information is being shared. Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. Implement policies that restrict the sharing of sensitive company information on employees' personal social media pages. Limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials.

Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.

Which of the following technologies uses variable-length packets, adds labels to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic? MPLS ISDN SONET ATM

MPLS

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.) Minimum password length Account lockout duration Password must meet complexity requirements Maximum password age Enforce password history Account lockout threshold

Minimum password length Account lockout threshold

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? Multilayer switch Layer 1 switch Unmanaged switch Layer 2 switch

Multilayer switch

Which of the following is a feature of MS-CHAPv2 that is not included in CHAP? Mutual authentication Three-way handshake Hashed shared secret Certificate-based authentication

Mutual authentication

Which of the following describes the lines used in a local loop for dial-up telephone access? SONET T1 POTS J1 MPLS

POTS

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? Packet sniffer IDS IPS Port scanner System logs

Port Scanner

You manage a network that uses switches. In the lobby of your building are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers in to the free network jacks and connect to the network, but you want employees who plug in to those same jacks to be able to connect to the network. Which feature should you configure? Spanning Tree VLANs Bonding Mirroring Port authentication

Port authentication

Which of the following purposes is a VPN primarily used for? Allow the use of network-attached printers. Allow remote systems to save on long-distance charges. Support secured communications over an untrusted network. Support the distribution of public web documents.

Support secured communications over an untrusted network.

Upon running a security audit in your organization, you discover that several sales employees are using the same domain user account to log in and update the company's customer database. Which action should you take? (Select two. Each response is part of a complete solution.) Train sales employees to use their own user accounts to update the customer database. Implement a Group Policy Object (GPO) that implements time-of-day login restrictions. Delete the account that the sales employees are currently using. Apply the Group Policy Object (GPO) to the container where the sales employees' user accounts reside. Implement a Group Policy Object (GPO) that restricts simultaneous logins to one.

Train sales employees to use their own user accounts to update the customer database. Delete the account that the sales employees are currently using.

Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.) 30 B channels operating at 64 Kbps each. Two B channels operating at 64 Kbps each. One D channel operating at 64 Kbps. One D channel operating at 16 Kbps. 23 B channels operating at 64 Kbps each.

Two B channels operating at 64 Kbps each. One D channel operating at 16 Kbps.

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration? Users must change the password at least every 10 days. The password must be entered within 10 minutes of the login prompt being displayed. The previous 10 passwords cannot be reused. The password must contain 10 or more characters. Users cannot change the password for 10 days.

Users cannot change the password for 10 days.

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? RADIUS DMZ VPN concentrator IDS IPS

VPN concentrator

Which of the following can route Layer 3 protocols across an IP network? IPsec PPTP GRE SSL

GRE

A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ASCII output only. Which of the following tcpdump options will achieve this output? -SXX port 443 -src port 443 -SX port 443 -SA port 443

-SX port 443

What is the speed of an OC-3 connection? 155 Mbps 622 Mbps 34 Mbps 45 Mbps

155 Mbps

Which Class of Service (CoS) priority value should be assigned to a video conference call? 3 4 6 7 2 0 1 5

4

Which of the following ports does TACACS use? 22 49 50 and 51 1812 and 1813 3389

49

Which of the following is the strongest form of multi-factor authentication? Two-factor authentication Two passwords A password, a biometric scan, and a token device A password and a biometric scan

A password, a biometric scan, and a token device

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the name of the company requesting payment? Wood Specialist Big 7, Inc Home Shop ACME, Inc

ACME, Inc

Which of the following is the term for when a system is unable to keep up with the demands placed on it? Latency Hard fault Jitter Bottleneck

Bottleneck

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals? CSU/DSU Modem Proxy IDS

CSU/DSU

Which of the following services is available regardless of whether the telephone company network is available? DSL Cable modem ISDN Dial-up

Cable modem

Which of the following is a best practice when establishing a baseline? Establish baselines within a network or device's first week of installation. Establish baselines using only specialized tools. Determine baselines over time by analyzing network traffic. Establish baselines only during the busiest times of the day.

Determine baselines over time by analyzing network traffic.

A network switch is configured to perform the following validation checks on its ports: All ARP requests and responses are intercepted. Each intercepted request is verified to ensure that it has a valid IP-to-MAC address binding. If the packet has a valid binding, the switch forwards the packet to the appropriate destination. If the packet has an invalid binding, the switch drops the ARP packet. Which security feature was enabled on the switch to accomplish this task? Dynamic ARP inspection DHCP snooping IGMP snooping Port security

Dynamic ARP inspection

You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client? PPP CHAP EAP MS-CHAP

EAP

While deploying Windows updates, when would you use the critical update ring? When deploying updates for any general user within the organization. When deploying updates to most of the organization in order to monitor for feedback. When deploying updates to users that want to stay on top of changes. When deploying updates to important systems (only after the update has been vetted).

When deploying updates to important systems (only after the update has been vetted).

When deploying Windows updates, when would you use the preview update ring? When deploying updates to important machines (only after the update has been vetted). When deploying updates to users that want to stay on top of changes. When deploying updates to most of the organization in order to monitor for feedback. When deploying updates for any general user within the organization.

When deploying updates to users that want to stay on top of changes.

Windows Update for Business (WUfB) lets you keep your devices current with the latest security upgrades and features. Which operating system releases does WUfB support? Windows 8 Home Windows 10 Windows 10 Home Windows 8

Windows 10

Which of the following forms of networking is highly susceptible to eavesdropping and must be secured accordingly? Satellite DSL Dial-up Wireless ISDN

Wireless

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently? netstat arp SSH arping

arp

You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server? ifconfig dig ipconfig Telnet

ifconfig

While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network? tracert traceroute ifconfig nslookup

traceroute

An employee named Bob Smith, whose username is bsmith, has left the company. You have been instructed to delete his user account and home directory. Which of the following commands would produce the desired outcome? (Select two.) userdel -r bsmith userdel bsmith userdel -x bsmith userdel bsmith;rm -rf /home/bsmith userdel -h bsmith

userdel -r bsmith userdel bsmith;rm -rf /home/bsmith

Which of the following utilities could you use to lock a user account? (Select two.) usermod ulimit passwd useradd userdel

usermod passwd

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command can you use to disable this account? usermod -L joer usermod -u joer usermod -d joer usermod -l joer

usermod -L joer

Which of the following are the customer's responsibility to maintain? (Select two.) DTE DCE PSE Local loop CO CPE

DTE CPE

When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites? Packets Frames Datagrams Bits

Packets

Which EAP implementation is MOST secure? EAP-FAST EAP-TLS LEAP EAP-MD5

EAP-TLS

Which of the following Network layer protocols provides authentication and encryption services for IP-based network traffic? SSL TCP L2TP IPsec

IPsec

MAtch

MAtch

Which of the following is a platform-independent authentication system that maintains a database of user accounts and passwords to centralize the maintenance of those accounts? NAS RRAS RADIUS EAP

RADIUS

Which of the following internet services provides equal upload and download bandwidth? SDSL VHDSL VDSL ADSL

SDSL

With Kerberos authentication, which of the following terms describes the token that verifies the user's identity to the target system? Coupon Voucher Ticket Hashkey

Ticket

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement? Spanning Tree Traffic shaping QoS Ethernet bonding

Ethernet bonding

Which of the following authentication protocols transmits passwords in cleartext and is considered too unsecure for modern networks? EAP CHAP RADIUS PAP

PAP

Which type of security uses MAC addresses to identity devices that are allowed or denied a connection to a switch? Port security Secure Sockets Layer Traffic shaping MAC spoofing

Port security

Which of the following is a mechanism for granting and validating certificates? Kerberos PKI RADIUS AAA

PKI

You have a Windows 10 system. You have used the Settings app to access Windows Update. From this location, how long can you pause updates? 365 days 30 days 7 days 14 days

7 days

You have a company network with a single switch. All devices connect to the network through the switch. You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access except to a special server that holds the patches the computers need to download. Which of the following components should be part of your solution? (Select two.) Honeypot Extranet 802.1x authentication Remediation servers Screened subnet

802.1x authentication Remediation servers

Which of the following is an example of two-factor authentication? A token device and a PIN A fingerprint and a retina scan A passphrase and a PIN A username and a password

A token device and a PIN

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? Ethernet bonding A traffic shaper A caching engine An application-specific integrated circuit

An application-specific integrated circuit

Which of the following are best practices for hardening a server? (Select three.) Disable inactive accounts. Establish time-of-day restrictions. Apply the latest patches and service packs. Set the account lockout threshold. Disable or uninstall unnecessary software. Require multiple authentication factors. Ensure that a host-based firewall is running.

Apply the latest patches and service packs. Disable or uninstall unnecessary software. Ensure that a host-based firewall is running.

Which type of internet service uses the DOCSIS specification? Fiber optic Shielded twisted pair Coaxial cable Unshielded twisted pair

Coaxial cable

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal? Install antivirus software on the Windows 2000 workstations, and configure them to automatically download and install updates. Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. Implement a host-based firewall on each Windows 2000 workstation, and configure them to automatically download and install updates. Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection.

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do? Configure account lockout policies in Group Policy. Configure day/time settings in user accounts. Configure account policies in Group Policy. Configure expiration settings in user accounts.

Configure account policies in Group Policy.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.) Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec. Configure the VPN connection to use MS-CHAPv2. Configure the VPN connection to use PPTP.

Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this? Proxy server Bandwidth shaper Circuit-level gateway Content switch

Content switch

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do? Create a granular password policy for Matt. Create a new group, make Matt a member of that group, and then apply the new policy directly to the new group. Make sure the new policy has a higher precedence value than the value for the existing policy. Create a granular password policy for Matt. Apply the new policy directly to Matt's user account. Remove Matt from the DirectorsGG group. Edit the existing password policy. Define exceptions for the required settings. Apply the exceptions to Matt's user account. Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.

Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.

A network switch detects a DHCP frame on the LAN that appears to have come from a DHCP server that is not located on the local network. In fact, it appears to have originated from outside the organization's firewall. As a result, the switch drops the DHCP message from that server. Which security feature was enabled on the switch to accomplish this? Port security IGMP snooping Dynamic ARP inspection DHCP snooping

DHCP snooping

Which of the following internet connection technologies requires that the location be within a limited distance of the telephone company's central office? DSL Wireless Cable modem Satellite

DSL

What does the Windows Update Delivery Optimization function do? Delivery Optimization lets you set active hours to indicate normal use for your device. The device will not reboot to install updates during this time. Delivery Optimization provides you with Windows and Store app updates and other Microsoft products. Delivery Optimization lets you view the updates you have installed. It also lets you uninstall an update if needed. Delivery Optimization lets you know when and if there are any urgent updates for your system and provides you with an option to download and install them.

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next? Fix the problem. Create an action plan. Document the problem. Determine if escalation is needed.

Determine if escalation is needed.

Which of the following is a best practice for router security? Disable unused protocols, services, and ports. Apply the latest patches and service packs. Install only the required software on the system. Ensure that a host-based firewall is running.

Disable unused protocols, services, and ports.

Which of the following is a characteristic of TACACS+? Uses UDP ports 1812 and 1813. Supports only TCP/IP. Encrypts the entire packet, not just authentication packets. Requires that authentication and authorization are combined in a single server.

Encrypts the entire packet, not just authentication packets.

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy? Identify the affected area. Establish the symptoms. Establish what has changed. Recognize the potential side effects of the problem.

Establish the symptoms.

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer? Run the wuauclt.exe /listupdates command. Check the Local Security Policy. Go to Programs and Features in Control Panel. Run the netsh winhttp import proxy source command.

Go to Programs and Features in Control Panel.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next? Identify the affected areas. Apply the patch to the router. Document the problem and the solution. Identify possible side effects of the solution.

Identify possible side effects of the solution.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next? Determine if anything has changed. Identify the affected areas of the network. Determine if escalation is necessary. Establish the most probable cause.

Identify the affected areas of the network.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next? Create an action plan. Identify the results and side effects of the solution. Document the problem and solution. Determine if escalation is necessary.

Identify the results and side effects of the solution.

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You need to make the change as easily as possible. Which of the following actions should you take? Go to Active Directory Users and Computers. Select all user accounts in the Directors OU and then edit the user account properties to require longer password. Create a GPO linked to the Directors OU. Configure the password policy in the new GPO. Create a new domain. Then move the contents of the Directors OU to the new domain and configure the necessary password policy on that domain. Implement a granular password policy for the users in the Directors OU.

Implement a granular password policy for the users in the Directors OU.

You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task? Port security Virtual private network (VPN) Network segmentation Data encryption using PKI

Network segmentation

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task? Data encryption using PKI Network segmentation Port security Virtual private network (VPN)

Network segmentation

With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 filter? Only packets with 192.168.0.34 in either the source or destination address are captured. Only packets on the 192.168.0.34 network are captured. Only packets with 192.168.0.34 in the destination address are captured. Only packets with 192.168.0.34 in the source address are captured.

Only packets with 192.168.0.34 in either the source or destination address are captured.

Which of the following VPN protocols is no longer considered secure? SSL TLS IPsec PPTP

PPTP

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal? ISDN Cable modem Satellite PSTN

PSTN

Which network type divides transmitted data into smaller pieces and allows multiple communications on the network medium? Multiplexed Managed Circuit-switched Packet-switched

Packet-switched

Which of the following security functions does CHAP perform? Periodically verifies the identity of a peer using a three-way handshake. Protects usernames. Links remote systems together. Allows the use of biometric devices.

Periodically verifies the identity of a peer using a three-way handshake.

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.) RADIUS AAA PKI EAP TACACS+

RADIUS TACACS+

Which of the following are differences between RADIUS and TACACS+? RADIUS encrypts the entire packet contents, while TACACS+ only encrypts the password. RADIUS supports more protocols than TACACS+. RADIUS uses TCP, while TACACS+ uses UDP. RADIUS combines authentication and authorization into a single function, while TACACS+ allows these services to be split between different servers.

RADIUS combines authentication and authorization into a single function, while TACACS+ allows these services to be split between different servers.

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office to access needed files. You want the connection to be as secure as possible. Which type of connection do you need? Intranet Internet Virtual private network Remote access

Remote access

What does a remote access server use for authorization? SLIP or PPP CHAP or MS-CHAP Usernames and passwords Remote access policies

Remote access policies

Which VPN tunnel style routes only certain types of traffic? Split Host-to-host Site-to-site Full

Split

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy? Document the solution. Test the solution. Recognize the potential side effects of the solution. Establish what has changed.

Test the solution.

What is the definition of bandwidth? The speed at which packets travel from source to destination and back. The amount of data that can be transferred from one place to another in a specific amount of time. The calculation of how often bits are damaged in transit due to electromagnetic interference. The condition that occurs when a system is unable to keep up with the demands placed on it.

The amount of data that can be transferred from one place to another in a specific amount of time.

Which statement BEST describes IPsec when used in tunnel mode? The entire data packet, including headers, is encapsulated. The identities of the communicating parties are not protected. IPsec in tunnel mode may not be used for WAN traffic. Packets are routed using the original headers, and only the payload is encrypted.

The entire data packet, including headers, is encapsulated.

Which of the following technologies does GSM use to allow multiple connections on the same frequency? Time-division multiple access Frequency-division multiple access Code-division multiple access Multiple-input, multiple-output

Time-division multiple access

Which of the following tools can you use to troubleshoot and validate Windows updates? (Select three.) Windows Update Troubleshooter Device Manager PowerShell Windows Defender Windows Transfer Service Windows Server Update Service (WSUS) Windows Server Troubleshooter

Windows Update Troubleshooter PowerShell Windows Server Update Service (WSUS)

Which of the following are true about Windows Update for Business? (Select three.) Windows Update for Business is a Group Policy management tool. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Windows Update for Business provides the latest features for your Windows 10 devices, but it does not include security upgrades. Windows Update for Business works with all versions of Windows 10 except Windows 10 Home. Windows Update for Business works with all versions of Windows 10. Windows Update for Business can only be configured with Group Policy. Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades.

Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Windows Update for Business works with all versions of Windows 10 except Windows 10 Home. Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades.

Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output? netstat nslookup dig ifconfig

netstat


Set pelajaran terkait

"Plethora" Most Nearly Means Drills

View Set

Planes & Axes of Movement - W.I.T.S

View Set