It Essentials

Páginas: 5 (1224 palabras) Publicado: 2 de octubre de 2012
A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.

Enable event logging on each user computer to check for unauthorized network access.

Enableevent logging on all network devices to audit any suspicious user activity.

Audit the event logs on the server to check for unauthorized network access.



2

When planning a new network, the administrator is interested in a physical topology that is used more often than any other. Which topology is the administrator considering?

bus

mesh

ring

star



3

A companywants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?

packet filtering

proxy

stateful packet inspection

stateless packet inspection



4

As part of the new security policy, a company decides to protect company data by performing backups on a regular basis.Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method?

differential

full

historical

incremental



Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the first line of the tracert command output displayed in theexhibit?

default gateway for the local computer

default gateway for the ISP

IP address on the local computer

IP address for the desired site



6

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

applications

physical addresses

packet size

portsprotocols



7

After adding several refurbished computers to the network, the network administrator receives complaints from the users that their connection to the network is too slow. The administrator finds that the computers are connected to 100 Mbps switch ports but are accessing the network at only 10 Mbps. What could be the problem?

The computers have NICs that are integrated intothe motherboard.

The computers are running Windows 2000.

The computers are configured to use a VPN.

The computers have NICs that support only 10 Mbps.



8

A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?

MD5

PGP

WEP

WPA9

Which protocol provides secure transport of data from the company web server to remote users?

HTTP

HTTPS

NetBEUI

DNS



10

Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?

Computers on a corporate network perform well without automatic updates because they are protected by a firewall.

Home usersshould avoid automatic updates because they are protected by Windows Internet Connection Firewall.

Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

Guest user accounts with limited access are unlikely to ever need updates because they are temporary users.



11

Which simple wireless configuration technique can makethe network invisible to unauthorized users?

Change the default password on the WAP.

Disable inactive wireless connections.

Filter all network access using MAC addresses.

Disable SSID broadcasting.



12

Which two hazards exist when working with fiber optic cabling? (Choose two.)

chemicals

copper strands

electricity

glass splinters

connectors



13...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • examen 1 it-essentials
  • Practica IT ESSENTIALS
  • planilla 5 it essentials
  • Cap:11 it essentials
  • Cap 1 It Essentials
  • examen 5 it-essentials
  • 1 Exam
  • It Essentials Cap 1 Resumen

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS