Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER 16
A network technician has received several reports regarding missing and corrupted
information on a company file server. Which course of action can the technician use to
investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network
access.
Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
proxy
A technician has been asked to format the drives of several Windows XP computers
with a file system that can use file-level permissions to secure confidential information.
Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
PGP
WEP
WPA
Which simple wireless configuration technique can make the network invisible to
unauthorized users?
Change the default password on the WAP.
full
historical
incremental
Which three items should be included in a local security policy? (Choose three.)
list of approved ISPs
Which two hashing algorithms are used to ensure that messages are unaltered during
transmission? (Choose two.)
ARP
DLC
MD5
NTP
SHA
TCP
hash encoding
symmetric encryption
VPN
Which three physical security measures are employed to prevent security breaches and
loss of data? (Choose three.)
antivirus program
software firewall
conduit
card key
strong password
security guard
Which data security technology takes the form of an object which must be close to a
computer before the user can successfully submit a username and password?
biometric device
smart card
thumb drive
Which physical security technology uses an embedded integrated circuit chip to store
data safely and is commonly used in secure ID badges?
smart card
biometric device
Which two file-level permissions allow a user to delete a file? (Choose two.)
read
modify
write
full control
list contents
What is the default setting for Windows XP operating system updates?
automatic
notify me
manual
backup
compress
ntbackup
zip
After a technician collects information from the computer, which two sources can
provide the technician with possible solutions for various types of network-related
problems? (Choose two.)
paperwork that is provided to customers
firewall logs
technical websites
A customer contacts a call center with problems updating anti-virus software. What two
types of question should the technician consider when gathering information from the
caller? (Choose two.)
closed-ended
direct
indirect
open-ended
system-specific
vendor-specific
Which two characteristics of network traffic are being monitored if a network technician
configures the company firewall to operate as a packet filter? (Choose two.)
applications
physical addresses
packet size
ports
protocols
A technician is asked whether the new procedures for backup use a backup rotation.
Which procedure describes a backup rotation?
Reuse backup media and choose its storage location according to
organizational guidelines. This ensures efficient and safe use of the backup
media.
Have different members of the network staff perform the backups so that everyone
has experience backing up data.
Back up the data at different times on different days so that a diverse amount of
data is backed up.
Select the partitions to be archived at each backup according to a predefined plan to
ensure everything is backed up over a given period.
The ABC Company network designers are designing the new corporate WiFi network.
Which two precautions should be implemented because of security concerns with
wireless networks? (Choose two.)
Shield the access point with a Faraday cage.