Test out Ch. 15

Ace your homework & exams now with Quizwiz!

You provide IT support for a dentist's office. The office has a limited number of wireless clients, so a simple wireless router is used to provide Wi-Fi access. On your latest visit, you check the manufacturer's website and discover that an update has been released by the wireless router manufacturer. You decide to download and install the update. Click the option you should use in the wireless router's configuration interface to prepare the device for the update.

Backup Configuration

You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement? a. Positive pressure system b. Negative pressure system c. Backup generator d. Line conditioner e. UPS

a. Positive pressure system

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use? a. RDP b. SSH c. TFTP d. FTP e. Telnet

a. RDP

In addition to performing regular backups, what must you do to protect your system from data loss? a. Regularly test restoration procedures. b. Restrict restoration privileges to system administrators. c. Store the backup media in an on-site fireproof vault. d. Write-protect all backup media.

a. Regularly test restoration procedures.

You've just installed a new 16U wall-mounted rack in your data center. You need to install the following equipment in this rack: A 4U redundant power supply A 4U server A 4U switch A 2U router Which of the following equipment will also fit in this rack along with the above equipment? a. 2U UPS b. 3U server c. 4U UPS d. 4U firewall

a. 2U UPS

You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.) a. Change the default administrative user name and password. b. Use an SSH client to access the router configuration. c. Use TFTP to back up the router configuration to a remote location. d. Use encrypted type 7 passwords. e. Use a web browser to access the router configuration using an HTTP connection.

a. Change the default administrative user name and password. b. Use an SSH client to access the router configuration.

You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure in a single component does not cause the website to become unavailable. What should you add to your configuration to accomplish this? a. Connect one server to the internet through a different ISP . b. On each server, add a second network connection to connect the c. server to the shared storage device. d. Reconfigure the disk array in a RAID 1+0 configuration. e. On each server, add a second network connection to the internet.

a. Connect one server to the internet through a different ISP .

Which of the following media types can you save backup files on? (Select two.) a. External hard drives b. Tape drives c. Network attached storage (NAS) d. The system disk

a. External hard drives c. Network attached storage (NAS)

You have heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log should you monitor? a. Firewall b. Security c. System d. Application

a. Firewall

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis (typically monthly)? a. Hotfix b. Kernel fix kit c. Targeted software patch d. Service pack

a. Hotfix

You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.) a. Install racks with locking doors. b. Install a humidifier within the data center. c. Install two-post 48U racks. d. Install a biometric lock on the data center door. e. Install two-post 24U racks.

a. Install racks with locking doors. d. Install a biometric lock on the data center door.

Which of the following statements are true about the fa0/0 interface? (Select three.) a. Several collisions have occurred. b. There have been no interface resets. c. The interface is running in half-duplex mode. d. The interface is dropping incoming packets. e. One cyclic redundancy check error has occurred. f. No input or output errors have occurred.

a. Several collisions have occurred. d. The interface is dropping incoming packets e. One cyclic redundancy check error has occurred.

Which of the following is the least effective power loss protection for computer systems? a. Surge protector b. Uninterruptible power supply c. Backup power generator d. Secondary power source

a. Surge protector

You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix? a. Test the hotfix, then apply it to all servers. b. Test the hotfix, then apply it to the server that had the problem. c. Apply the hotfix immediately to all servers. d. Apply the hotfix immediately to the server; apply the hotfix to other devices only as the security threat manifests itself.

a. Test the hotfix, then apply it to all servers.

You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use? a. Throughput tester b. Load tester c. Baseline d. Packet sniffer

a. Throughput tester

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a cross-over UTP plenum cable that will run through the suspended tile ceiling of the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device in the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.) a. You should implement a UPS between the wall outlet and the network devices. b. You must use a straight-through cable to connect the two switches together. c. You should not connect networking equipment to a 20-amp wall circuit. d. You should not run a plenum cable through a suspended tile ceiling. e. You should implement redundant power supplies for the network devices.

a. You should implement a UPS between the wall outlet and the network devices. e. You should implement redundant power supplies for the network devices.

Which of the following is the best recommendation for applying hotfixes to your servers? a. Wait until a hotfix becomes a patch, then apply it. b. Apply only the hotfixes that apply to software running on your systems. c. Apply hotfixes immediately as they are released. d. Apply all hotfixes before applying the corresponding service pack.

b. Apply only the hotfixes that apply to software running on your systems.

Beside protecting a computer from under-voltages, a typical UPS also performs which two actions? a. Prevents electric shock b. Conditions the power signal c. Protects from over-voltages d. Prevents ESD

b. Conditions the power signal c. Protects from over-voltages

Which of the following functions can a port scanner provide? a. Auditing IPsec encryption algorithm configuration. b. Determining which ports are open on a network. c. Testing virus definition design for false positives. d. Automatically close open ports on the network.

b. Determining which ports are open on a network.

Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.) a. Use of SFTP for transferring SNMP data b. Encryption of SNMP messages c. Hashing of the community name d. Authentication for agents and managers

b. Encryption of SNMP messages d. Authentication for agents and managers

Which of the following are reasons to use a protocol analyzer? (Select two.) a. Measure the amount of data that can be transferred through a network. b. Identify users that are connecting to unauthorized websites. c. Simulate a large number of client connections to a website. d. Identify when a network is slow. e. Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS.

b. Identify users that are connecting to unauthorized websites e. Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS.

Which of the following statements is true? A system image backup: a. Does not include user profile settings. b. Is saved as a .vhd file. c. Is the only type of backup supported by the backup and restore console. d. Can be saved to a Bitlocker-enabled volume.

b. Is saved as a .vhd file

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. Will this configuration work? a. Yes. This configuration complies with data center best practices. b. No. You should not run a cable across the floor of the data center. c. No. You should not use blade servers for virtualization. d. No. You must implement the UPS and power supplies to the rack externally. e. No. You must use a cross-over cable to connect the two switches together.

b. No. You should not run a cable across the floor of the data center.

Why should you store backup media off site? a. To make the restoration process more efficient. b. To reduce the possibility of theft. c. To prevent the same disaster from affecting both the network and the backup media. d. To comply with government regulations.

c. To prevent the same disaster from affecting both the network and the backup media.

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environment monitoring device within the rack. Currently, the device shows that the temperature within the rack is 70 degrees Fahrenheit (21 degrees Celsius). What should you do? a. Install an additional air conditioning unit for the server room. b. Nothing. The temperature within the rack is within acceptable limits. c. Re-orient the cold aisle within the server room so that it is directed toward the air conditioner's return duct. d. Install a humidifier to increase the humidity within the server room.

b. Nothing. The temperature within the rack is within acceptable limits.

You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine? a. System b. Performance c. Security d. Firewall

b. Performance

Which of the following protocols or services would you associate with Window's Remote Desktop Services network traffic? a. WTSP b. RDP c. NNTP d. WPA

b. RDP

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem? a. The primary protocol of your network b. SNMP c. SMTP d. IPX e. TCP/IP

b. SNMP

You have been struggling to keep the temperature in your server room under control. To address this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.) a. The hot aisle should face the air conditioner's output ducts. b. The rear of your servers should face the hot aisle. c. The rear of your servers should face the cold aisle. d. The front of your servers should face the hot aisle. e. The front of your servers should face the cold aisle. f. The cold aisle should face the air conditioner's return duct.

b. The rear of your servers should face the hot aisle. e. The front of your servers should face the cold aisle.

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do? a. Use a remote access utility such as SSH to access router and switch consoles remotely. b. Use syslog to implement centralized logging. c. Hire additional resources to help monitor and manage your network infrastructure. d. Consolidate network resources down to one or two switches.

b. Use syslog to implement centralized logging.

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have resolved the problem, but you would like to be able to manage the server remotely just in case more issues occur. Which of the following protocols would you use for remote management? (Select two.) a. PPTP b. VNC c. L2TP d. PPPoE e. PPP f. ICA

b. VNC f. ICA

Consider the following log message generated on a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message? a. FastEthernet0/0 b. -5- c. %LINEPROTO d. UPDOWN

c. %LINEPROTO

Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60%, and the temperature is 80 degrees. What should you do to help reduce problems? a. Add line conditioners in the server room. b. Add a de-humidifier to the server room. c. Add a separate A/C unit in the server room. d. Add a humidifier to the server room.

c. Add a separate A/C unit in the server room.

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem? a. Packet sniffer b. Load tester c. Application log d. Throughput tester

c. Application log

You manage a firewall that connects your private network to the internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use? a. Packet sniffer b. Throughput tester c. Event log d. Load tester

c. Event log

You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. The power supplies in the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center? a. Capacitor b. Transistor c. Inverter d. Transformer

c. Inverter

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use? a. System log b. Baseline c. Load tester d. Packet sniffer e. Throughput tester

c. Load tester

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you see frames addressed to the four workstations, but not to the router. Which feature should you configure? a. Spanning tree b. Promiscuous mode c. Mirroring d. Bonding

c. Mirroring

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation, not other devices. Which feature should you configure? a. Spanning tree b. Mirroring c. Promiscuous mode d. Bonding

c. Promiscuous mode

Which of the following is a standard for sending log messages to a central logging server? a. LC4 b. OVAL c. Syslog d. Nmap

c. Syslog

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do? a. Implement a RADIUS solution. b. Combine SNMP with SSL. c. Use SSH instead of SNMP. d. Implement version 3 of SNMP

d. Implement version 3 of SNMP

You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use? a. IPS b. IDS c. Throughput tester d. Packet sniffer e. Port scanner

d. Packet sniffer

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use? a. Certifier b. Toner probe c. Multimeter d. Protocol analyzer e. TDR

d. Protocol analyzer

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do? a. Configure the default gateway address on hosts A and B with the IP address of Host C. b. Connect hosts A and B together on the same switch port through a hub. c. Manually set the MAC address of Host C to the MAC address of Host A. d. Run the packet sniffer application on Host B.

d. Run the packet sniffer application on Host B.

Which protocol uses traps to send notifications from network devices? a. ICMP b. IGMP c. IMAP4 d. SNMP e. SMTP

d. SNMP

Each of the following are tools used to check the health of a network. Which of these is typically used for managing and sending messages from one computer system to another? a. Packet sniffer b. Load tester c. Protocol analyzer d. syslog

d. syslog

You are concerned about attacks directed at the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use? a. Throughput tester b. Event log c. Load tester d. System log e. Packet sniffer

e. Packet sniffer


Related study sets

Federal Income Tax 3325 Chapter 6 Homework

View Set