Examen

Solo disponible en BuenasTareas
  • Páginas : 5 (1224 palabras )
  • Descarga(s) : 0
  • Publicado : 19 de diciembre de 2010
Leer documento completo
Vista previa del texto
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.

Enable event logging on each user computer to check for unauthorized network access.

Enableevent logging on all network devices to audit any suspicious user activity.

Audit the event logs on the server to check for unauthorized network access.

2

When planning a new network, the administrator is interested in a physical topology that is used more often than any other. Which topology is the administrator considering?

bus

mesh

ring

star

3

A company wants toconfigure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?

packet filtering

proxy

stateful packet inspection

stateless packet inspection

4

As part of the new security policy, a company decides to protect company data by performing backups on a regular basis. Whichbackup type takes the greatest amount of time and is commonly used in conjunction with another backup method?

differential

full

historical

incremental

Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the first line of the tracert command output displayed in the exhibit?

defaultgateway for the local computer

default gateway for the ISP

IP address on the local computer

IP address for the desired site

6

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

applications

physical addresses

packet size

ports

protocols

7After adding several refurbished computers to the network, the network administrator receives complaints from the users that their connection to the network is too slow. The administrator finds that the computers are connected to 100 Mbps switch ports but are accessing the network at only 10 Mbps. What could be the problem?

The computers have NICs that are integrated into the motherboard.

Thecomputers are running Windows 2000.

The computers are configured to use a VPN.

The computers have NICs that support only 10 Mbps.

8

A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?

MD5

PGP

WEP

WPA

9

Which protocolprovides secure transport of data from the company web server to remote users?

HTTP

HTTPS

NetBEUI

DNS

10

Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?

Computers on a corporate network perform well without automatic updates because they are protected by a firewall.

Home users should avoid automatic updates becausethey are protected by Windows Internet Connection Firewall.

Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.

11

Which simple wireless configuration technique can make the network invisible to unauthorizedusers?

Change the default password on the WAP.

Disable inactive wireless connections.

Filter all network access using MAC addresses.

Disable SSID broadcasting.

12

Which two hazards exist when working with fiber optic cabling? (Choose two.)

chemicals

copper strands

electricity

glass splinters

connectors

13

A technician has been asked to format the...
tracking img